Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 6 out of 9 pages
Viewing questions 51-60 out of questions
Questions # 51:

During a penetration test, the tester uses a vulnerability scanner to collect information about any possible vulnerabilities that could be used to compromise the network. The tester receives the results and then executes the following command:

snmpwalk -v 2c -c public 192.168.1.23

Which of the following is the tester trying to do based on the command they used?

Options:

A.

Bypass defensive systems to collect more information.


B.

Use an automation tool to perform the attacks.


C.

Script exploits to gain access to the systems and host.


D.

Validate the results and remove false positives.


Expert Solution
Questions # 52:

During a red-team exercise, a penetration tester obtains an employee's access badge. The tester uses the badge's information to create a duplicate for unauthorized entry. Which of the following best describes this action?

Options:

A.

Smurfing


B.

Credential stuffing


C.

RFID cloning


D.

Card skimming


Expert Solution
Questions # 53:

A company's incident response team determines that a breach occurred because a penetration tester left a web shell. Which of the following should the penetration tester have done after the engagement?

Options:

A.

Enable a host-based firewall on the machine


B.

Remove utilized persistence mechanisms on client systems


C.

Revert configuration changes made during the engagement


D.

Turn off command-and-control infrastructure


Expert Solution
Questions # 54:

A penetration tester is evaluating a SCADA system. The tester receives local access to a workstation that is running a single application. While navigating through the application, the tester opens a terminal window and gains access to the underlying operating system. Which of the following attacks is the tester performing?

Options:

A.

Kiosk escape


B.

Arbitrary code execution


C.

Process hollowing


D.

Library injection


Expert Solution
Questions # 55:

You are a penetration tester reviewing a client’s website through a web browser.

INSTRUCTIONS

Review all components of the website through the browser to determine if vulnerabilities are present.

Remediate ONLY the highest vulnerability from either the certificate, source, or cookies.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Question # 55

Question # 55

Question # 55

Question # 55

Question # 55

Question # 55

Question # 55


Expert Solution
Questions # 56:

Which of the following OT protocols sends information in cleartext?

Options:

A.

TTEthernet


B.

DNP3


C.

Modbus


D.

PROFINET


Expert Solution
Questions # 57:

A penetration tester needs to scan a remote infrastructure with Nmap. The tester issues the following command:

nmap 10.10.1.0/24

Which of the following is the number of TCP ports that will be scanned?

Options:

A.

256


B.

1,000


C.

1,024


D.

65,535


Expert Solution
Questions # 58:

While conducting a peer review for a recent assessment, a penetration tester finds the debugging mode is still enabled for the production system. Which of the following is most likely responsible for this observation?

Options:

A.

Configuration changes were not reverted.


B.

A full backup restoration is required for the server.


C.

The penetration test was not completed on time.


D.

The penetration tester was locked out of the system.


Expert Solution
Questions # 59:

A tester performs a vulnerability scan and identifies several outdated libraries used within the customer SaaS product offering. Which of the following types of scans did the tester use to identify the libraries?

Options:

A.

IAST


B.

SBOM


C.

DAST


D.

SAST


Expert Solution
Questions # 60:

A penetration tester is preparing a password-spraying attack against a known list of users for the company "example". The tester is using the following list of commands:

pw-inspector -i sailwords -t 8 -S pass

spray365.py spray -ep plan

users="~/user.txt"; allwords="~/words.txt"; pass="~/passwords.txt"; plan="~/spray.plan"

spray365.py generate --password-file $pass --userfile $user --domain "example.com" --execution-plan $plan

cew -m 5 "http://www.example.com " -w sailwords

Which of the following is the correct order for the list of the commands?

Options:

A.

3, 4, 1, 2, 5


B.

3, 1, 2, 5, 4


C.

2, 3, 1, 4, 5


D.

3, 5, 1, 4, 2


Expert Solution
Viewing page 6 out of 9 pages
Viewing questions 51-60 out of questions