Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions
Questions # 41:

A penetration tester needs to test a very large number of URLs for public access. Given the following code snippet:

1 import requests

2 import pathlib

3

4 for url in pathlib.Path("urls.txt").read_text().split("\n"):

5 response = requests.get(url)

6 if response.status == 401:

7 print("URL accessible")

Which of the following changes is required?

Options:

A.

The condition on line 6


B.

The method on line 5


C.

The import on line 1


D.

The delimiter in line 3


Expert Solution
Questions # 42:

A penetration tester plans to conduct reconnaissance during an engagement using readily available resources. Which of the following resources would most likely identify hardware and software being utilized by the client?

Options:

A.

Cryptographic flaws


B.

Protocol scanning


C.

Cached pages


D.

Job boards


Expert Solution
Questions # 43:

A tester is performing an external phishing assessment on the top executives at a company. Two-factor authentication is enabled on the executives’ accounts that are in the scope of work. Which of the following should the tester do to get access to these accounts?

Options:

A.

Configure an external domain using a typosquatting technique. Configure Evilginx to bypass two-factor authentication using a phishlet that simulates the mail portal for the company.


B.

Configure Gophish to use an external domain. Clone the email portal web page from the company and get the two-factor authentication code using a brute-force attack method.


C.

Configure an external domain using a typosquatting technique. Configure SET to bypass two-factor authentication using a phishlet that mimics the mail portal for the company.


D.

Configure Gophish to use an external domain. Clone the email portal web page from the company and get the two-factor authentication code using a vishing method.


Expert Solution
Questions # 44:

A penetration tester needs to scan a remote infrastructure with Nmap. The tester issues the following command:

nmap 10.10.1.0/24

Which of the following is the number of TCP ports that will be scanned?

Options:

A.

256


B.

1,000


C.

1,024


D.

65,535


Expert Solution
Questions # 45:

SIMULATION

Using the output, identify potential attack vectors that should be further investigated.

Question # 45

Question # 45

Question # 45

Question # 45

Question # 45


Expert Solution
Questions # 46:

A penetration tester runs a network scan but has some issues accurately enumerating the vulnerabilities due to the following error:

OS identification failed

Which of the following is most likely causing this error?

Options:

A.

The scan did not reach the target because of a firewall block rule.


B.

The scanner database is out of date.


C.

The scan is reporting a false positive.


D.

The scan cannot gather one or more fingerprints from the target.


Expert Solution
Questions # 47:

A penetration testing team needs to determine whether it is possible to disrupt wireless communications for PCs deployed in the client’s offices. Which of the following techniques should the penetration tester leverage?

Options:

A.

Port mirroring


B.

Sidecar scanning


C.

ARP poisoning


D.

Channel scanning


Expert Solution
Questions # 48:

A consultant starts a network penetration test. The consultant uses a laptop that is hardwired to the network to try to assess the network with the appropriate tools. Which of the following should the consultant engage first?

Options:

A.

Service discovery


B.

OS fingerprinting


C.

Host discovery


D.

DNS enumeration


Expert Solution
Questions # 49:

During a penetration test, a tester captures information about an SPN account. Which of the following attacks requires this information as a prerequisite to proceed?

Options:

A.

Golden Ticket


B.

Kerberoasting


C.

DCShadow


D.

LSASS dumping


Expert Solution
Questions # 50:

Which of the following components should a penetration tester include in the final assessment report?

Options:

A.

User activities


B.

Customer remediation plan


C.

Key management


D.

Attack narrative


Expert Solution
Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions