Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions
Questions # 11:

A penetration tester needs to obtain sensitive data from several executives who regularly work while commuting by train. Which of the following methods should the tester use for this task?

Options:

A.

Shoulder surfing


B.

Credential harvesting


C.

Bluetooth spamming


D.

MFA fatigue


Expert Solution
Questions # 12:

A penetration tester needs to complete cleanup activities from the testing lead. Which of the following should the tester do to validate that reverse shell payloads are no longer running?

Options:

A.

Run scripts to terminate the implant on affected hosts.


B.

Spin down the C2 listeners.


C.

Restore the firewall settings of the original affected hosts.


D.

Exit from C2 listener active sessions.


Expert Solution
Questions # 13:

A penetration tester identifies the following open ports during a network enumeration scan:

PORT STATE SERVICE

22/tcp open ssh

80/tcp open http

111/tcp open rpcbind

443/tcp open https

27017/tcp open mongodb

50123/tcp open ms-rpc

Which of the following commands did the tester use to get this output?

Options:

A.

nmap -Pn -A 10.10.10.10


B.

nmap -sV 10.10.10.10


C.

nmap -Pn -w 10.10.10.10


D.

nmap -sV -Pn -p- 10.10.10.10


Expert Solution
Questions # 14:

A penetration tester is trying to get unauthorized access to a web application and executes the following command:

GET /foo/images/file?id=2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2fetc%2fpasswd

Which of the following web application attacks is the tester performing?

Options:

A.

Insecure Direct Object Reference


B.

Cross-Site Request Forgery


C.

Directory Traversal


D.

Local File Inclusion


Expert Solution
Questions # 15:

During an assessment, a penetration tester obtains an NTLM hash from a legacy Windows machine. Which of the following tools should the penetration tester use to continue the attack?

Options:

A.

Responder


B.

Hydra


C.

BloodHound


D.

CrackMapExec


Expert Solution
Questions # 16:

A penetration tester is searching for vulnerabilities or misconfigurations on a container environment. Which of the following tools will the tester most likely use to achieve this objective?

Options:

A.

Nikto


B.

Trivy


C.

Nessus


D.

Nmap


Expert Solution
Questions # 17:

During an engagement, a penetration tester needs to break the key for the Wi-Fi network that uses WPA2 encryption. Which of the following attacks would accomplish this objective?

Options:

A.

ChopChop


B.

Replay


C.

Initialization vector


D.

KRACK


Expert Solution
Questions # 18:

While conducting a reconnaissance activity, a penetration tester extracts the following information:

Emails: - admin@acme.com - sales@acme.com - support@acme.com

Which of the following risks should the tester use to leverage an attack as the next step in the security assessment?

Options:

A.

Unauthorized access to the network


B.

Exposure of sensitive servers to the internet


C.

Likelihood of SQL injection attacks


D.

Indication of a data breach in the company


Expert Solution
Questions # 19:

A penetration tester finishes a security scan and uncovers numerous vulnerabilities on several hosts. Based on the targets' EPSS (Exploit Prediction Scoring System) and CVSS (Common Vulnerability Scoring System) scores, which of the following targets is the most likely to get attacked?

Options:

A.

Target 1: EPSS Score = 0.6, CVSS Score = 4


B.

Target 2: EPSS Score = 0.3, CVSS Score = 2


C.

Target 3: EPSS Score = 0.6, CVSS Score = 1


D.

Target 4: EPSS Score = 0.4, CVSS Score = 4.5


Expert Solution
Questions # 20:

A penetration tester has adversely affected a critical system during an engagement, which could have a material impact on the organization. Which of the following should the penetration tester do to address this issue?

Options:

A.

Restore the configuration.


B.

Perform a BIA.


C.

Follow the escalation process.


D.

Select the target.


Expert Solution
Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions