Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 3 out of 10 pages
Viewing questions 21-30 out of questions
Questions # 21:

A penetration tester performs a service enumeration process and receives the following result after scanning a server using the Nmap tool:

bash

PORT STATE SERVICE

22/tcp open ssh

25/tcp filtered smtp

111/tcp open rpcbind

2049/tcp open nfs

Based on the output, which of the following services provides the best target for launching an attack?

Options:

A.

Database


B.

Remote access


C.

Email


D.

File sharing


Expert Solution
Questions # 22:

A penetration tester is using OSINT to identify client email addresses found on the web for a phishing campaign. Which of the following is the best search operator for the tester to use?

Options:

A.

site:


B.

intitle:


C.

intext:


D.

inurl:


Expert Solution
Questions # 23:

During a vulnerability assessment, a penetration tester finds the following information:

KRBTGT account with more than 1250 days without password change.

Which of the following tools could an attacker use to exploit this vulnerability?

Options:

A.

Mimikatz


B.

John the Ripper


C.

Hashcat


D.

Hydra


Expert Solution
Questions # 24:

During a security assessment, a penetration tester gains access to an internal server and manipulates some data to hide its presence. Which of the following is the best way for the penetration tester to hide the activities performed?

Options:

A.

Clear the Windows event logs.


B.

Modify the system time.


C.

Alter the log permissions.


D.

Reduce the log retention settings.


Expert Solution
Questions # 25:

A penetration tester launches an attack against company employees. The tester clones the company ' s intranet login page and sends the link via email to all employees.

Which of the following best describes the objective and tool selected by the tester to perform this activity?

Options:

A.

Gaining remote access using BeEF


B.

Obtaining the list of email addresses using theHarvester


C.

Harvesting credentials using SET


D.

Launching a phishing campaign using GoPhish


Expert Solution
Questions # 26:

Which of the following is within the scope of proper handling and is most crucial when working on a penetration testing report?

Options:

A.

Keeping both video and audio of everything that is done


B.

Keeping the report to a maximum of 5 to 10 pages in length


C.

Basing the recommendation on the risk score in the report


D.

Making the report clear for all objectives with a precise executive summary


Expert Solution
Questions # 27:

During a routine penetration test, the client’s security team observes logging alerts that indicate several ID badges were reprinted after working hours without authorization. Which of the following is the penetration tester most likely trying to do?

Options:

A.

Obtain long-term, valid access to the facility


B.

Disrupt the availability of facility access systems


C.

Change access to the facility for valid users


D.

Revoke access to the facility for valid users


Expert Solution
Questions # 28:

A penetration tester is authorized to perform a DoS attack against a host on a network. Given the following input:

ip = IP( " 192.168.50.2 " )

tcp = TCP(sport=RandShort(), dport=80, flags= " S " )

raw = RAW(b " X " *1024)

p = ip/tcp/raw

send(p, loop=1, verbose=0)

Which of the following attack types is most likely being used in the test?

Options:

A.

MDK4


B.

Smurf attack


C.

FragAttack


D.

SYN flood


Expert Solution
Questions # 29:

A penetration tester sets up a C2 (Command and Control) server to manage and control payloads deployed in the target network. Which of the following tools is the most suitable for establishing a robust and stealthy connection?

Options:

A.

ProxyChains


B.

Covenant


C.

PsExec


D.

sshuttle


Expert Solution
Questions # 30:

A penetration testing team needs to determine whether it is possible to disrupt wireless communications for PCs deployed in the client’s offices. Which of the following techniques should the penetration tester leverage?

Options:

A.

Port mirroring


B.

Sidecar scanning


C.

ARP poisoning


D.

Channel scanning


Expert Solution
Viewing page 3 out of 10 pages
Viewing questions 21-30 out of questions