Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 7 out of 9 pages
Viewing questions 61-70 out of questions
Questions # 61:

During a penetration test, a tester captures information about an SPN account. Which of the following attacks requires this information as a prerequisite to proceed?

Options:

A.

Golden Ticket


B.

Kerberoasting


C.

DCShadow


D.

LSASS dumping


Expert Solution
Questions # 62:

A penetration tester is attempting to discover vulnerabilities in a company's web application. Which of the following tools would most likely assist with testing the security of the web application?

Options:

A.

OpenVAS


B.

Nessus


C.

sqlmap


D.

Nikto


Expert Solution
Questions # 63:

A penetration tester finds that an application responds with the contents of the /etc/passwd file when the following payload is sent:

<!DOCTYPE data [ ]>

&foo;

Which of the following should the tester recommend in the report to best prevent this type of vulnerability?

Options:

A.

Drop all excessive file permissions with chmod o-rwx


B.

Ensure the requests application access logs are reviewed frequently


C.

Disable the use of external entities


D.

Implement a WAF to filter all incoming requests


Expert Solution
Questions # 64:

A penetration tester is configuring a vulnerability management solution to perform credentialed scans of an Active Directory server. Which of the following account types should the tester provide to the scanner?

Options:

A.

Read-only


B.

Domain administrator


C.

Local user


D.

Root


Expert Solution
Questions # 65:
Options:

A.

Responder


B.

Mimikatz


C.

Hydra


D.

BloodHound


E.

TruffleHog


Expert Solution
Questions # 66:

A penetration tester needs to identify all vulnerable input fields on a customer website. Which of the following tools would be best suited to complete this request?

Options:

A.

DAST


B.

SAST


C.

IAST


D.

SCA


Expert Solution
Questions # 67:

A penetration tester is enumerating a Linux system. The goal is to modify the following script to provide more comprehensive system information:

#!/bin/bash

ps aux >> linux_enum.txt

Which of the following lines would provide the most comprehensive enumeration of the system?

Options:

A.

cat /etc/passwd >> linux_enum.txt; netstat -tuln >> linux_enum.txt; cat /etc/bash.bashrc >> linux_enum.txt


B.

whoami >> linux_enum.txt; uname -a >> linux_enum.txt; ifconfig >> linux_enum.txt


C.

hostname >> linux_enum.txt; echo $USER >> linux_enum.txt; curl ifconfig.me >> linux_enum.txt


D.

lsof -i >> linux_enum.txt; uname -a >> linux_enum.txt; ls /home/ >> linux_enum.txt


Expert Solution
Questions # 68:

An internal penetration tester is on site assessing network access for company-owned mobile devices. Which of the following would be the best tool to identify the available networks?

Options:

A.

Wireshark


B.

theHarvester


C.

Recon-ng


D.

WiGLE.net


Expert Solution
Questions # 69:

A penetration tester finished a security scan and uncovered numerous vulnerabilities on several hosts. Based on the targets' EPSS and CVSS scores, which of the following targets is the most likely to get attacked?

Options:

A.

Target 1: EPSS Score = 0.6 and CVSS Score = 4


B.

Target 2: EPSS Score = 0.3 and CVSS Score = 2


C.

Target 3: EPSS Score = 0.6 and CVSS Score = 1


D.

Target 4: EPSS Score = 0.4 and CVSS Score = 4.5


Expert Solution
Questions # 70:

A penetration tester obtains a regular domain user's set of credentials. The tester wants to attempt a dictionary attack by creating a custom word list based on the Active Directory password policy. Which of the following tools should the penetration tester use to retrieve the password policy?

Options:

A.

Responder


B.

CrackMapExec


C.

Hydra


D.

msfvenom


Expert Solution
Viewing page 7 out of 9 pages
Viewing questions 61-70 out of questions