Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 2 out of 9 pages
Viewing questions 11-20 out of questions
Questions # 11:

A penetration tester gained a foothold within a network. The penetration tester needs to enumerate all users within the domain. Which of the following is the best way to accomplish this task?

Options:

A.

pwd.exe


B.

net.exe


C.

sc.exe


D.

msconfig.exe


Expert Solution
Questions # 12:

A penetration tester finishes a security scan and uncovers numerous vulnerabilities on several hosts. Based on the targets' EPSS (Exploit Prediction Scoring System) and CVSS (Common Vulnerability Scoring System) scores, which of the following targets is the most likely to get attacked?

Options:

A.

Target 1: EPSS Score = 0.6, CVSS Score = 4


B.

Target 2: EPSS Score = 0.3, CVSS Score = 2


C.

Target 3: EPSS Score = 0.6, CVSS Score = 1


D.

Target 4: EPSS Score = 0.4, CVSS Score = 4.5


Expert Solution
Questions # 13:

While conducting an assessment, a penetration tester identifies details for several unreleased products announced at a company-wide meeting.

Which of the following attacks did the tester most likely use to discover this information?

Options:

A.

Eavesdropping


B.

Bluesnarfing


C.

Credential harvesting


D.

SQL injection attack


Expert Solution
Questions # 14:

After a recent penetration test was conducted by the company's penetration testing team, a systems administrator notices the following in the logs:

2/10/2023 05:50AM C:\users\mgranite\schtasks /query

2/10/2023 05:53AM C:\users\mgranite\schtasks /CREATE /SC DAILY

Which of the following best explains the team's objective?

Options:

A.

To enumerate current users


B.

To determine the users' permissions


C.

To view scheduled processes


D.

To create persistence in the network


Expert Solution
Questions # 15:

A penetration tester gains shell access to a Windows host. The tester needs to permanently turn off protections in order to install additional payload. Which of the following commands is most appropriate?

Options:

A.

sc config start=disabled


B.

sc query state= all


C.

pskill


D.

net config


Expert Solution
Questions # 16:
Options:

A.

pwinspector -i -o -m 8 -M 16 -1 -u -n -p


B.

responder -I eth0


C.

nmap -sV -n -T3 -p 22 --reason


D.

hydra -L root -P /path/to/wordlist -t 3 -M


Expert Solution
Questions # 17:

During a penetration test, a tester attempts to pivot from one Windows 10 system to another Windows system. The penetration tester thinks a local firewall is blocking connections. Which of the following command-line utilities built into Windows is most likely to disable the firewall?

Options:

A.

certutil.exe


B.

bitsadmin.exe


C.

msconfig.exe


D.

netsh.exe


Expert Solution
Questions # 18:

During a discussion of a penetration test final report, the consultant shows the following payload used to attack a system:

html

Copy code

7/aLeRt('pwned')

Based on the code, which of the following options represents the attack executed by the tester and the associated countermeasure?

Options:

A.

Arbitrary code execution: the affected computer should be placed on a perimeter network


B.

SQL injection attack: should be detected and prevented by a web application firewall


C.

Cross-site request forgery: should be detected and prevented by a firewall


D.

XSS obfuscated: should be prevented by input sanitization


Expert Solution
Questions # 19:

A penetration tester has been provided with only the public domain name and must enumerate additional information for the public-facing assets.

INSTRUCTIONS

Select the appropriate answer(s), given the output from each section.

Output 1

Question # 19

Question # 19

Question # 19

Question # 19

Question # 19

Question # 19


Expert Solution
Questions # 20:

Which of the following techniques is the best way to avoid detection by data loss prevention tools?

Options:

A.

Encoding


B.

Compression


C.

Encryption


D.

Obfuscation


Expert Solution
Viewing page 2 out of 9 pages
Viewing questions 11-20 out of questions