Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 2 out of 9 pages
Viewing questions 11-20 out of questions
Questions # 11:

A penetration tester reviews a SAST vulnerability scan report. The following vulnerability has been reported as high severity:

Source file: components.ts

Issue 2 of 12: Command injection

Severity: High

Call: .innerHTML = response

The tester inspects the source file and finds the variable response is defined as a constant and is not referred to or used in other sections of the code. Which of the following describes how the tester should classify this reported vulnerability?

Options:

A.

False negative


B.

False positive


C.

True positive


D.

Low severity


Expert Solution
Questions # 12:

A penetration tester enters an invalid user ID on the login page of a web application. The tester receives a message indicating the user is not found. Then, the tester tries a valid user ID but an incorrect password, but the web application indicates the password is invalid. Which of the following should the tester attempt next?

Options:

A.

Error log analysis


B.

DoS attack


C.

Enumeration


D.

Password dictionary attack


Expert Solution
Questions # 13:

A penetration tester wants to gather the names of potential phishing targets who have access to sensitive data. Which of the following would best meet this goal?

Options:

A.

WHOIS


B.

Censys.io


C.

SpiderFoot


D.

theHarvester


Expert Solution
Questions # 14:

A tester obtains access to an endpoint subnet and wants to move laterally in the network. Given the following Nmap scan output:

Nmap scan report for some_host

Host is up (0.01s latency).

PORT STATE SERVICE

445/tcp open microsoft-ds

Host script results:

smb2-security-mode: Message signing disabled

Which of the following command and attack methods is the most appropriate for reducing the chances of being detected?

Options:

A.

responder -I eth0 -dwv ntlmrelayx.py -smb2support -tf


B.

msf > use exploit/windows/smb/ms17_010_psexec


C.

hydra -L administrator -P /path/to/passwdlist smb://


D.

nmap --script smb-brute.nse -p 445


Expert Solution
Questions # 15:

A penetration tester executes multiple enumeration commands to find a path to escalate privileges. Given the following command:

find / -user root -perm -4000 -exec ls -ldb {} \; 2>/dev/null

Which of the following is the penetration tester attempting to enumerate?

Options:

A.

Attack path mapping


B.

API keys


C.

Passwords


D.

Permission


Expert Solution
Questions # 16:

A penetration tester needs to help create a threat model of a custom application. Which of the following is the most likely framework the tester will use?

Options:

A.

MITRE ATT&CK


B.

OSSTMM


C.

CI/CD


D.

DREAD


Expert Solution
Questions # 17:

Which of the following frameworks can be used to classify threats?

Options:

A.

PTES


B.

STRIDE


C.

OSSTMM


D.

OCTAVE


Expert Solution
Questions # 18:

A tester gains initial access to a server and needs to enumerate all corporate domain DNS records. Which of the following commands should the tester use?

Options:

A.

dig +short A AAAA local.domain


B.

nslookup local.domain


C.

dig axfr @local.dns.server


D.

nslookup -server local.dns.server local.domain *


Expert Solution
Questions # 19:

A penetration tester is working on an engagement in which a main objective is to collect confidential information that could be used to exfiltrate data and perform a ransomware attack. During the engagement, the tester is able to obtain an internal foothold on the target network. Which of the following is the next task the tester should complete to accomplish the objective?

Options:

A.

Initiate a social engineering campaign.


B.

Perform credential dumping.


C.

Compromise an endpoint.


D.

Share enumeration.


Expert Solution
Questions # 20:

During an assessment, a penetration tester gains access to one of the internal hosts. Given the following command:

schtasks /create /sc onlogon /tn "Windows Update" /tr "cmd.exe /c reverse_shell.exe"

Which of the following is the penetration tester trying to do with this code?

Options:

A.

Enumerate the scheduled tasks


B.

Establish persistence


C.

Deactivate the Windows Update functionality


D.

Create a binary application for Windows System Updates


Expert Solution
Viewing page 2 out of 9 pages
Viewing questions 11-20 out of questions