Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 6 out of 10 pages
Viewing questions 51-60 out of questions
Questions # 51:

A penetration tester gains access to a Windows machine and wants to further enumerate users with native operating system credentials. Which of the following should the tester use?

Options:

A.

route


B.

nbtstat


C.

net


D.

whoami


Expert Solution
Questions # 52:

During an assessment, a penetration tester obtains access to an internal server and would like to perform further reconnaissance by capturing LLMNR traffic. Which of the following tools should the tester use?

Options:

A.

Burp Suite


B.

Netcat


C.

Responder


D.

Nmap


Expert Solution
Questions # 53:

While conducting a peer review for a recent assessment, a penetration tester finds the debugging mode is still enabled for the production system. Which of the following is most likely responsible for this observation?

Options:

A.

Configuration changes were not reverted.


B.

A full backup restoration is required for the server.


C.

The penetration test was not completed on time.


D.

The penetration tester was locked out of the system.


Expert Solution
Questions # 54:

A penetration tester completed OSINT work and needs to identify all subdomains for mydomain.com. Which of the following is the best command for the tester to use?

Options:

A.

nslookup mydomain.com » /path/to/results.txt


B.

crunch 1 2 | xargs -n 1 -I ' X ' nslookup X.mydomain.com


C.

dig @8.8.8.8 mydomain.com ANY » /path/to/results.txt


D.

cat wordlist.txt | xargs -n 1 -I ' X ' dig X.mydomain.com


Expert Solution
Questions # 55:

You are a security analyst tasked with hardening a web server.

You have been given a list of HTTP payloads that were flagged as malicious.

INSTRUCTIONS

Given the following attack signatures, determine the attack type, and then identify the associated remediation to prevent the attack in the future.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Question # 55


Expert Solution
Questions # 56:

Testing and reporting activities are complete. A penetration tester needs to verify that exploited systems have been restored to preengagement conditions. Which of the following would be most appropriate for the tester to do?

Options:

A.

Terminate the running command-and-control payload.


B.

Provide the customer with a list of the changes made.


C.

Replace environment variables with their original values.


D.

Put in a change request ticket to reimage the system.


Expert Solution
Questions # 57:

Which of the following could be used to enhance the quality and reliability of a vulnerability scan report?

Options:

A.

Risk analysis


B.

Peer review


C.

Root cause analysis


D.

Client acceptance


Expert Solution
Questions # 58:

During a red-team exercise, a penetration tester obtains an employee ' s access badge. The tester uses the badge’s information to create a duplicate for unauthorized entry.

Which of the following best describes this action?

Options:

A.

Smurfing


B.

Credential stuffing


C.

RFID cloning


D.

Card skimming


Expert Solution
Questions # 59:

A penetration tester wants to send a specific network packet with custom flags and sequence numbers to a vulnerable target. Which of the following should the tester use?

Options:

A.

tcprelay


B.

Bluecrack


C.

Scapy


D.

tcpdump


Expert Solution
Questions # 60:

Which of the following activities should be performed to prevent uploaded web shells from being exploited by others?

Options:

A.

Remove the persistence mechanisms.


B.

Spin down the infrastructure.


C.

Preserve artifacts.


D.

Perform secure data destruction.


Expert Solution
Viewing page 6 out of 10 pages
Viewing questions 51-60 out of questions