Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 4 out of 10 pages
Viewing questions 31-40 out of questions
Questions # 31:

A company hires a penetration tester to test the security of its wireless networks. The main goal is to intercept and access sensitive data.

Which of the following tools should the security professional use to best accomplish this task?

Options:

A.

Metasploit


B.

WiFi-Pumpkin


C.

SET


D.

theHarvester


E.

WiGLE.net


Expert Solution
Questions # 32:

A penetration tester wants to use PowerView in an AD environment. Which of the following is the most likely reason?

Options:

A.

To collect local hashes


B.

To decrypt stored passwords


C.

To enumerate user groups


D.

To escalate privileges


Expert Solution
Questions # 33:

A penetration tester obtains password dumps associated with the target and identifies strict lockout policies. The tester does not want to lock out accounts when attempting access. Which of the following techniques should the tester use?

Options:

A.

Credential stuffing


B.

MFA fatigue


C.

Dictionary attack


D.

Brute-force attack


Expert Solution
Questions # 34:

A penetration tester is performing a security review of a web application. Which of the following should the tester leverage to identify the presence of vulnerable open-source libraries?

Options:

A.

VM


B.

IAST


C.

DAST


D.

SCA


Expert Solution
Questions # 35:

During a penetration test, a tester compromises a Windows computer. The tester executes the following command and receives the following output:

mimikatz # privilege::debug

mimikatz # lsadump::cache

---Output---

lapsUser

27dh9128361tsg2€459210138754ij

---OutputEnd---

Which of the following best describes what the tester plans to do by executing the command?

Options:

A.

The tester plans to perform the first step to execute a Golden Ticket attack to compromise the Active Directory domain.


B.

The tester plans to collect application passwords or hashes to compromise confidential information within the local computer.


C.

The tester plans to use the hash collected to perform lateral movement to other computers using a local administrator hash.


D.

The tester plans to collect the ticket information from the user to perform a Kerberoasting attack on the domain controller.


Expert Solution
Questions # 36:

A penetration tester finds that an application responds with the contents of the /etc/passwd file when the following payload is sent:

xml

Copy code

< ?xml version= " 1.0 " ? >

< !DOCTYPE data [

< !ENTITY foo SYSTEM " file:///etc/passwd " >

] >

< test > & foo; < /test >

Which of the following should the tester recommend in the report to best prevent this type of vulnerability?

Options:

A.

Drop all excessive file permissions with chmod o-rwx.


B.

Ensure the requests application access logs are reviewed frequently.


C.

Disable the use of external entities.


D.

Implement a WAF to filter all incoming requests.


Expert Solution
Questions # 37:

A penetration tester attempts to run an automated web application scanner against a target URL. The tester validates that the web page is accessible from a different device. The tester analyzes the following HTTP request header logging output:

200; GET /login.aspx HTTP/1.1 Host: foo.com; User-Agent: Mozilla/5.0

200; GET /login.aspx HTTP/1.1 Host: foo.com; User-Agent: Mozilla/5.0

No response; POST /login.aspx HTTP/1.1 Host: foo.com; User-Agent: curl

200; POST /login.aspx HTTP/1.1 Host: foo.com; User-Agent: Mozilla/5.0

No response; GET /login.aspx HTTP/1.1 Host: foo.com; User-Agent: python

Which of the following actions should the tester take to get the scans to work properly?

Options:

A.

Modify the scanner to slow down the scan.


B.

Change the source IP with a VPN.


C.

Modify the scanner to only use HTTP GET requests.


D.

Modify the scanner user agent.


Expert Solution
Questions # 38:

A client recently hired a penetration testing firm to conduct an assessment of their consumer-facing web application. Several days into the assessment, the client’s networking team observes a substantial increase in DNS traffic. Which of the following would most likely explain the increase in DNS traffic?

Options:

A.

Covert data exfiltration


B.

URL spidering


C.

HTML scraping


D.

DoS attack


Expert Solution
Questions # 39:

A penetration tester writes the following script to enumerate a /24 network:

1 #!/bin/bash

2 for i in {1..254}

3 ping -c1 192.168.1.$i

4 done

The tester executes the script, but it fails with the following error:

-bash: syntax error near unexpected token ' ping '

Which of the following should the tester do to fix the error?

Options:

A.

Add do after line 2


B.

Replace {1..254} with $(seq 1 254)


C.

Replace bash with zsh


D.

Replace $i with ${i}


Expert Solution
Questions # 40:

While performing a penetration testing exercise, a tester executes the following command:

bash

Copy code

PS c:\tools > c:\hacks\PsExec.exe \\server01.comptia.org -accepteula cmd.exe

Which of the following best explains what the tester is trying to do?

Options:

A.

Test connectivity using PSExec on the server01 using CMD.exe.


B.

Perform a lateral movement attack using PsExec.


C.

Send the PsExec binary file to the server01 using CMD.exe.


D.

Enable CMD.exe on the server01 through PsExec.


Expert Solution
Viewing page 4 out of 10 pages
Viewing questions 31-40 out of questions