Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 5 out of 9 pages
Viewing questions 41-50 out of questions
Questions # 41:

A penetration tester is conducting a wireless security assessment for a client with 2.4GHz and 5GHz access points. The tester places a wireless USB dongle in the laptop to start capturing WPA2 handshakes. Which of the following steps should the tester take next?

Options:

A.

Enable monitoring mode using Aircrack-ng.


B.

Use Kismet to automatically place the wireless dongle in monitor mode and collect handshakes.


C.

Run KARMA to break the password.


D.

Research WiGLE.net for potential nearby client access points.


Expert Solution
Questions # 42:

During a penetration test, a junior tester uses Hunter.io for an assessment and plans to review the information that will be collected. Which of the following describes the information the junior tester will receive from the Hunter.io tool?

Options:

A.

A collection of email addresses for the target domain that is available on multiple sources on the internet


B.

DNS records for the target domain and subdomains that could be used to increase the external attack surface


C.

Data breach information about the organization that could be used for additional enumeration


D.

Information from the target's main web page that collects usernames, metadata, and possible data exposures


Expert Solution
Questions # 43:

A tester is working on an engagement that has evasion and stealth requirements. Which of the following enumeration methods is the least likely to be detected by the IDS?

Options:

A.

curl https://api.shodan.io/shodan/host/search?key= &query=hostname:


B.

proxychains nmap -sV -T2


C.

for i in ; do curl -k $i; done


D.

nmap -sV -T2


Expert Solution
Questions # 44:

A penetration tester conducts reconnaissance for a client's network and identifies the following system of interest:

$ nmap -A AppServer1.compita.org

Starting Nmap 7.80 (2023-01-14) on localhost (127.0.0.1) at 2023-08-04 15:32:27

Nmap scan report for AppServer1.compita.org (192.168.1.100)

Host is up (0.001s latency).

Not shown: 999 closed ports

Port State Service

21/tcp open ftp

22/tcp open ssh

23/tcp open telnet

80/tcp open http

135/tcp open msrpc

139/tcp open netbios-ssn

443/tcp open https

445/tcp open microsoft-ds

873/tcp open rsync

8080/tcp open http-proxy

8443/tcp open https-alt

9090/tcp open zeus-admin

10000/tcp open snet-sensor-mgmt

The tester notices numerous open ports on the system of interest. Which of the following best describes this system?

Options:

A.

A honeypot


B.

A Windows endpoint


C.

A Linux server


D.

An already-compromised system


Expert Solution
Questions # 45:

During a penetration test, you gain access to a system with a limited user interface. This machine appears to have access to an isolated network that you would like to port scan.

INSTRUCTIONS

Analyze the code segments to determine which sections are needed to complete a port scanning script.

Drag the appropriate elements into the correct locations to complete the script.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Question # 45


Expert Solution
Questions # 46:

A penetration tester is performing an assessment focused on attacking the authentication identity provider hosted within a cloud provider. During the reconnaissance phase, the tester finds that the system is using OpenID Connect with OAuth and has dynamic registration enabled. Which of the following attacks should the tester try first?

Options:

A.

A password-spraying attack against the authentication system


B.

A brute-force attack against the authentication system


C.

A replay attack against the authentication flow in the system


D.

A mask attack against the authentication system


Expert Solution
Questions # 47:

A penetration tester is performing a cloud-based penetration test against a company. Stakeholders have indicated the priority is to see if the tester can get into privileged systems that are not directly accessible from the internet. Given the following scanner information:

Server-side request forgery (SSRF) vulnerability in test.comptia.org

Reflected cross-site scripting (XSS) vulnerability in test2.comptia.org

Publicly accessible storage system named static_comptia_assets

SSH port 22 open to the internet on test3.comptia.org

Open redirect vulnerability in test4.comptia.org

Which of the following attack paths should the tester prioritize first?

Options:

A.

Synchronize all the information from the public bucket and scan it with Trufflehog.


B.

Run Pacu to enumerate permissions and roles within the cloud-based systems.


C.

Perform a full dictionary brute-force attack against the open SSH service using Hydra.


D.

Use the reflected cross-site scripting attack within a phishing campaign to attack administrators.


E.

Leverage the SSRF to gain access to credentials from the metadata service.


Expert Solution
Questions # 48:

Given the following statements:

Implement a web application firewall.

Upgrade end-of-life operating systems.

Implement a secure software development life cycle.

In which of the following sections of a penetration test report would the above statements be found?

Options:

A.

Executive summary


B.

Attack narrative


C.

Detailed findings


D.

Recommendations


Expert Solution
Questions # 49:
Options:

A.

Wayback Machine


B.

Hunter.io


C.

SpiderFoot


D.

Social Engineering Toolkit


Expert Solution
Questions # 50:

A tester runs an Nmap scan against a Windows server and receives the following results:

Nmap scan report for win_dns.local (10.0.0.5)

Host is up (0.014s latency)

Port State Service

53/tcp open domain

161/tcp open snmp

445/tcp open smb-ds

3389/tcp open rdp

Which of the following TCP ports should be prioritized for using hash-based relays?

Options:

A.

53


B.

161


C.

445


D.

3389


Expert Solution
Viewing page 5 out of 9 pages
Viewing questions 41-50 out of questions