Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 3 out of 9 pages
Viewing questions 21-30 out of questions
Questions # 21:

A penetration tester is getting ready to conduct a vulnerability scan as part of the testing process. The tester will evaluate an environment that consists of a container orchestration cluster. Which of the following tools should the tester use to evaluate the cluster?

Options:

A.

Trivy


B.

Nessus


C.

Grype


D.

Kube-hunter


Expert Solution
Questions # 22:

A penetration tester is attempting to discover vulnerabilities in a company's web application. Which of the following tools would most likely assist with testing the security of the web application?

Options:

A.

OpenVAS


B.

Nessus


C.

sqlmap


D.

Nikto


Expert Solution
Questions # 23:

A penetration tester currently conducts phishing reconnaissance using various tools and accounts for multiple intelligence-gathering platforms. The tester wants to consolidate some of the tools and accounts into one solution to analyze the output from the intelligence-gathering tools. Which of the following is the best tool for the penetration tester to use?

Options:

A.

Caldera


B.

SpiderFoot


C.

Maltego


D.

WIGLE.net


Expert Solution
Questions # 24:

During a security assessment, a penetration tester uses a tool to capture plaintext log-in credentials on the communication between a user and an authentication system. The tester wants to use this information for further unauthorized access. Which of the following tools is the tester using?

Options:

A.

Burp Suite


B.

Wireshark


C.

Zed Attack Proxy


D.

Metasploit


Expert Solution
Questions # 25:

A penetration tester needs to obtain sensitive data from several executives who regularly work while commuting by train. Which of the following methods should the tester use for this task?

Options:

A.

Shoulder surfing


B.

Credential harvesting


C.

Bluetooth spamming


D.

MFA fatigue


Expert Solution
Questions # 26:

A penetration tester needs to evaluate the order in which the next systems will be selected for testing. Given the following output:

Hostname | IP address | CVSS 2.0 | EPSS

hrdatabase | 192.168.20.55 | 9.9 | 0.50

financesite | 192.168.15.99 | 8.0 | 0.01

legaldatabase | 192.168.10.2 | 8.2 | 0.60

fileserver | 192.168.125.7 | 7.6 | 0.90

Which of the following targets should the tester select next?

Options:

A.

fileserver


B.

hrdatabase


C.

legaldatabase


D.

financesite


Expert Solution
Questions # 27:

During an internal penetration test, a tester compromises a Windows OS-based endpoint and bypasses the defensive mechanisms. The tester also discovers that the endpoint is part of an Active Directory (AD) local domain.

The tester’s main goal is to leverage credentials to authenticate into other systems within the Active Directory environment.

Which of the following steps should the tester take to complete the goal?

Options:

A.

Use Mimikatz to collect information about the accounts and try to authenticate in other systems


B.

Use Hashcat to crack a password for the local user on the compromised endpoint


C.

Use Evil-WinRM to access other systems in the network within the endpoint credentials


D.

Use Metasploit to create and execute a payload and try to upload the payload into other systems


Expert Solution
Questions # 28:

During an engagement, a penetration tester found some weaknesses that were common across the customer’s entire environment. The weaknesses included the following:

Weaker password settings than the company standard

Systems without the company's endpoint security software installed

Operating systems that were not updated by the patch management system

Which of the following recommendations should the penetration tester provide to address the root issue?

Options:

A.

Add all systems to the vulnerability management system.


B.

Implement a configuration management system.


C.

Deploy an endpoint detection and response system.


D.

Patch the out-of-date operating systems.


Expert Solution
Questions # 29:

During an assessment, a penetration tester sends the following request:

POST /services/v1/users/create HTTP/1.1

Host: target-application.com

Content-Type: application/json

Content-Length: [dynamic]

Authorization: Bearer (FUZZ)

Which of the following attacks is the penetration tester performing?

Options:

A.

Directory traversal


B.

API abuse


C.

Server-side request forgery


D.

Privilege escalation


Expert Solution
Questions # 30:

A penetration tester cannot complete a full vulnerability scan because the client's WAF is blocking communications. During which of the following activities should the penetration tester discuss this issue with the client?

Options:

A.

Goal reprioritization


B.

Peer review


C.

Client acceptance


D.

Stakeholder alignment


Expert Solution
Viewing page 3 out of 9 pages
Viewing questions 21-30 out of questions