Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 5 out of 8 pages
Viewing questions 41-50 out of questions
Questions # 41:

During a security assessment for an internal corporate network, a penetration tester wants to gain unauthorized access to internal resources by executing an attack that uses software to disguise itself as legitimate software. Which of the following host-based attacks should the tester use?

Options:

A.

On-path


B.

Logic bomb


C.

Rootkit


D.

Buffer overflow


Expert Solution
Questions # 42:

A penetration tester identifies an exposed corporate directory containing first and last names and phone numbers for employees. Which of the following attack techniques would be the most effective to pursue if the penetration tester wants to compromise user accounts?

Options:

A.

Smishing


B.

Impersonation


C.

Tailgating


D.

Whaling


Expert Solution
Questions # 43:

Which of the following components should a penetration tester include in an assessment report?

Options:

A.

User activities


B.

Customer remediation plan


C.

Key management


D.

Attack narrative


Expert Solution
Questions # 44:

A company hires a penetration tester to perform an external attack surface review as part of a security engagement. The company informs the tester that the main company domain to investigate is comptia.org. Which of the following should the tester do to accomplish the assessment objective?

Options:

A.

Perform information-gathering techniques to review internet-facing assets for the company.


B.

Perform a phishing assessment to try to gain access to more resources and users’ computers.


C.

Perform a physical security review to identify vulnerabilities that could affect the company.


D.

Perform a vulnerability assessment over the main domain address provided by the client.


Expert Solution
Questions # 45:

A penetration tester would like to leverage a CSRF vulnerability to gather sensitive details from an application's end users. Which of the following tools should the tester use for this task?

Options:

A.

Browser Exploitation Framework


B.

Maltego


C.

Metasploit


D.

theHarvester


Expert Solution
Questions # 46:

A penetration tester obtains the following output during an Nmap scan:

PORT STATE SERVICE

135/tcp open msrpc

445/tcp open microsoft-ds

1801/tcp open msmq

2103/tcp open msrpc

3389/tcp open ms-wbt-server

Which of the following should be the next step for the tester?

Options:

A.

Search for vulnerabilities on msrpc.


B.

Enumerate shares and search for vulnerabilities on the SMB service.


C.

Execute a brute-force attack against the Remote Desktop Services.


D.

Execute a new Nmap command to search for another port.


Expert Solution
Questions # 47:

A penetration tester is compiling the final report for a recently completed engagement. A junior QA team member wants to know where they can find details on the impact, overall security findings, and high-level statements. Which of the following sections of the report would most likely contain this information?

Options:

A.

Quality control


B.

Methodology


C.

Executive summary


D.

Risk scoring


Expert Solution
Questions # 48:

A penetration tester reviews a SAST vulnerability scan report. The following vulnerability has been reported as high severity:

Source file: components.ts

Issue 2 of 12: Command injection

Severity: High

Call: .innerHTML = response

The tester inspects the source file and finds the variable response is defined as a constant and is not referred to or used in other sections of the code. Which of the following describes how the tester should classify this reported vulnerability?

Options:

A.

False negative


B.

False positive


C.

True positive


D.

Low severity


Expert Solution
Questions # 49:

A penetration tester wants to maintain access to a compromised system after a reboot. Which of the following techniques would be best for the tester to use?

Options:

A.

Establishing a reverse shell


B.

Executing a process injection attack


C.

Creating a scheduled task


D.

Performing a credential-dumping attack


Expert Solution
Questions # 50:

Which of the following could be used to enhance the quality and reliability of a vulnerability scan report?

Options:

A.

Risk analysis


B.

Peer review


C.

Root cause analysis


D.

Client acceptance


Expert Solution
Viewing page 5 out of 8 pages
Viewing questions 41-50 out of questions