Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 3 out of 9 pages
Viewing questions 21-30 out of questions
Questions # 21:

A penetration tester obtains password dumps associated with the target and identifies strict lockout policies. The tester does not want to lock out accounts when attempting access. Which of the following techniques should the tester use?

Options:

A.

Credential stuffing


B.

MFA fatigue


C.

Dictionary attack


D.

Brute-force attack


Expert Solution
Questions # 22:

A penetration tester launches an attack against company employees. The tester clones the company's intranet login page and sends the link via email to all employees.

Which of the following best describes the objective and tool selected by the tester to perform this activity?

Options:

A.

Gaining remote access using BeEF


B.

Obtaining the list of email addresses using theHarvester


C.

Harvesting credentials using SET


D.

Launching a phishing campaign using GoPhish


Expert Solution
Questions # 23:

A penetration tester finds it is possible to downgrade a web application's HTTPS connections to HTTP while performing on-path attacks on the local network. The tester reviews the output of the server response to:

curl -s -i https://internalapp/

HTTP/2 302

date: Thu, 11 Jan 2024 15:56:24 GMT

content-type: text/html; charset=iso-8659-1

location: /login

x-content-type-options: nosniff

server: Prod

Which of the following recommendations should the penetration tester include in the report?

Options:

A.

Add the HSTS header to the server.


B.

Attach the httponly flag to cookies.


C.

Front the web application with a firewall rule to block access to port 80.


D.

Remove the x-content-type-options header.


Expert Solution
Questions # 24:

During an assessment, a penetration tester obtains access to a Microsoft SQL server using sqlmap and runs the following command:

sql> xp_cmdshell whoami /all

Which of the following is the tester trying to do?

Options:

A.

List database tables


B.

Show logged-in database users


C.

Enumerate privileges


D.

Display available SQL commands


Expert Solution
Questions # 25:

Which of the following techniques is the best way to avoid detection by data loss prevention tools?

Options:

A.

Encoding


B.

Compression


C.

Encryption


D.

Obfuscation


Expert Solution
Questions # 26:

Severity: HIGH

Vulnerability: ABC Load Balancer: Alpha OS httpd TLS vulnerability

An Nmap scan of the affected device produces the following results:

Host is up (0.0000040s latency).

Not shown: 98 closed tcp ports (reset)

PORT STATE SERVICE

22/tcp open ssh

80/tcp open http

443/tcp closed https

Which of the following best describes this scenario?

Options:

A.

True negative


B.

True positive


C.

False negative


D.

False positive


Expert Solution
Questions # 27:

A previous penetration test report identified a host with vulnerabilities that was

successfully exploited. Management has requested that an internal member of the

security team reassess the host to determine if the vulnerability still exists.

Question # 27

Part 1:

. Analyze the output and select the command to exploit the vulnerable service.

Part 2:

. Analyze the output from each command.

· Select the appropriate set of commands to escalate privileges.

· Identify which remediation steps should be taken.

Question # 27


Expert Solution
Questions # 28:

A penetration tester must identify vulnerabilities within an ICS (Industrial Control System) that is not connected to the internet or enterprise network. Which of the following should the tester utilize to conduct the testing?

Options:

A.

Channel scanning


B.

Stealth scans


C.

Source code analysis


D.

Manual assessment


Expert Solution
Questions # 29:

Which of the following tasks would ensure the key outputs from a penetration test are not lost as part of the cleanup and restoration activities?

Options:

A.

Preserving artifacts


B.

Reverting configuration changes


C.

Keeping chain of custody


D.

Exporting credential data


Expert Solution
Questions # 30:

Which of the following explains the reason a tester would opt to use DREAD over PTES during the planning phase of a penetration test?

Options:

A.

The tester is conducting a web application test.


B.

The tester is assessing a mobile application.


C.

The tester is evaluating a thick client application.


D.

The tester is creating a threat model.


Expert Solution
Viewing page 3 out of 9 pages
Viewing questions 21-30 out of questions