Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which of the following explains the reason a tester would opt to use DREAD over PTES during the planning phase of a penetration test?

Options:

A.

The tester is conducting a web application test.


B.

The tester is assessing a mobile application.


C.

The tester is evaluating a thick client application.


D.

The tester is creating a threat model.


Expert Solution
Questions # 32:

A penetration tester cannot complete a full vulnerability scan because the client's WAF is blocking communications. During which of the following activities should the penetration tester discuss this issue with the client?

Options:

A.

Goal reprioritization


B.

Peer review


C.

Client acceptance


D.

Stakeholder alignment


Expert Solution
Questions # 33:

A penetration tester obtains password dumps associated with the target and identifies strict lockout policies. The tester does not want to lock out accounts when attempting access. Which of the following techniques should the tester use?

Options:

A.

Credential stuffing


B.

MFA fatigue


C.

Dictionary attack


D.

Brute-force attack


Expert Solution
Questions # 34:

During a penetration test, the tester identifies several unused services that are listening on all targeted internal laptops. Which of the following technical controls should the tester recommend to reduce the risk of compromise?

Question # 34

Options:

A.

Multifactor authentication


B.

Patch management


C.

System hardening


D.

Network segmentation


Expert Solution
Questions # 35:

Which of the following elements of a penetration test report can be used to most effectively prioritize the remediation efforts for all the findings?

Options:

A.

Methodology


B.

Detailed findings list


C.

Risk score


D.

Executive summary


Expert Solution
Questions # 36:

During an assessment, a penetration tester gains a low-privilege shell and then runs the following command:

findstr /SIM /C:"pass" *.txt *.cfg *.xml

Which of the following is the penetration tester trying to enumerate?

Options:

A.

Configuration files


B.

Permissions


C.

Virtual hosts


D.

Secrets


Expert Solution
Questions # 37:

During a security assessment of an e-commerce website, a penetration tester wants to exploit a vulnerability in the web server’s input validation that will allow unauthorized transactions on behalf of the user. Which of the following techniques would most likely be used for that purpose?

Options:

A.

Privilege escalation


B.

DOM injection


C.

Session hijacking


D.

Cross-site scripting


Expert Solution
Questions # 38:

While performing a penetration testing exercise, a tester executes the following command:

bash

Copy code

PS c:\tools> c:\hacks\PsExec.exe \\server01.comptia.org -accepteula cmd.exe

Which of the following best explains what the tester is trying to do?

Options:

A.

Test connectivity using PSExec on the server01 using CMD.exe.


B.

Perform a lateral movement attack using PsExec.


C.

Send the PsExec binary file to the server01 using CMD.exe.


D.

Enable CMD.exe on the server01 through PsExec.


Expert Solution
Questions # 39:

A penetration tester is performing an assessment focused on attacking the authentication identity provider hosted within a cloud provider. During the reconnaissance phase, the tester finds that the system is using OpenID Connect with OAuth and has dynamic registration enabled. Which of the following attacks should the tester try first?

Options:

A.

A password-spraying attack against the authentication system


B.

A brute-force attack against the authentication system


C.

A replay attack against the authentication flow in the system


D.

A mask attack against the authentication system


Expert Solution
Questions # 40:

A penetration tester attempts unauthorized entry to the company's server room as part of a security assessment. Which of the following is the best technique to manipulate the lock pins and open the door without the original key?

Options:

A.

Plug spinner


B.

Bypassing


C.

Decoding


D.

Raking


Expert Solution
Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions