Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 3 out of 7 pages
Viewing questions 21-30 out of questions
Questions # 21:

During an engagement, a penetration tester wants to enumerate users from Linux systems by using finger and rwho commands. However, the tester realizes these commands alone will not achieve the desired result. Which of the following is the best tool to use for this task?

Options:

A.

Nikto


B.

Burp Suite


C.

smbclient


D.

theHarvester


Expert Solution
Questions # 22:

A penetration tester writes the following script to enumerate a 1724 network:

1 #!/bin/bash

2 for i in {1..254}; do

3 ping -c1 192.168.1.$i

4 done

The tester executes the script, but it fails with the following error:

-bash: syntax error near unexpected token `ping'

Which of the following should the tester do to fix the error?

Options:

A.

Add do after line 2.


B.

Replace {1..254} with $(seq 1 254).


C.

Replace bash with tsh.


D.

Replace $i with ${i}.


Expert Solution
Questions # 23:

During an engagement, a penetration tester found some weaknesses that were common across the customer’s entire environment. The weaknesses included the following:

    Weaker password settings than the company standard

    Systems without the company's endpoint security software installed

    Operating systems that were not updated by the patch management system

Which of the following recommendations should the penetration tester provide to address the root issue?

Options:

A.

Add all systems to the vulnerability management system.


B.

Implement a configuration management system.


C.

Deploy an endpoint detection and response system.


D.

Patch the out-of-date operating systems.


Expert Solution
Questions # 24:

A penetration tester completes a scan and sees the following output on a host:

bash

Copy code

Nmap scan report for victim (10.10.10.10)

Host is up (0.0001s latency)

PORT STATE SERVICE

161/udp open|filtered snmp

445/tcp open microsoft-ds

3389/tcp open microsoft-ds

Running Microsoft Windows 7

OS CPE: cpe:/o:microsoft:windows_7_sp0

The tester wants to obtain shell access. Which of the following related exploits should the tester try first?

Options:

A.

exploit/windows/smb/psexec


B.

exploit/windows/smb/ms08_067_netapi


C.

exploit/windows/smb/ms17_010_eternalblue


D.

auxiliary/scanner/snmp/snmp_login


Expert Solution
Questions # 25:

A penetration tester successfully clones a source code repository and then runs the following command:

find . -type f -exec egrep -i "token|key|login" {} \;

Which of the following is the penetration tester conducting?

Options:

A.

Data tokenization


B.

Secrets scanning


C.

Password spraying


D.

Source code analysis


Expert Solution
Questions # 26:

A penetration tester sets up a C2 (Command and Control) server to manage and control payloads deployed in the target network. Which of the following tools is the most suitable for establishing a robust and stealthy connection?

Options:

A.

ProxyChains


B.

Covenant


C.

PsExec


D.

sshuttle


Expert Solution
Questions # 27:

A penetration tester wants to use PowerView in an AD environment. Which of the following is the most likely reason?

Options:

A.

To collect local hashes


B.

To decrypt stored passwords


C.

To enumerate user groups


D.

To escalate privileges


Expert Solution
Questions # 28:

A penetration tester is conducting reconnaissance on a target network. The tester runs the following Nmap command: nmap -sv -sT -p - 192.168.1.0/24. Which of the following describes the most likely purpose of this scan?

Options:

A.

OS fingerprinting


B.

Attack path mapping


C.

Service discovery


D.

User enumeration


Expert Solution
Questions # 29:

A penetration tester has been provided with only the public domain name and must enumerate additional information for the public-facing assets.

INSTRUCTIONS

Select the appropriate answer(s), given the output from each section.

Output 1

Question # 29

Question # 29

Question # 29

Question # 29

Question # 29

Question # 29


Expert Solution
Questions # 30:

While conducting an assessment, a penetration tester identifies details for several unreleased products announced at a company-wide meeting.

Which of the following attacks did the tester most likely use to discover this information?

Options:

A.

Eavesdropping


B.

Bluesnarfing


C.

Credential harvesting


D.

SQL injection attack


Expert Solution
Viewing page 3 out of 7 pages
Viewing questions 21-30 out of questions