Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 7 out of 10 pages
Viewing questions 61-70 out of questions
Questions # 61:

A penetration tester gains shell access to a Windows host. The tester needs to permanently turn off protections in order to install additional payload. Which of the following commands is most appropriate?

Options:

A.

sc config < svc_name > start=disabled


B.

sc query state= all


C.

pskill < pid_svc_name >


D.

net config < svc_name >


Expert Solution
Questions # 62:

A penetration tester would like to leverage a CSRF vulnerability to gather sensitive details from an application ' s end users. Which of the following tools should the tester use for this task?

Options:

A.

Browser Exploitation Framework


B.

Maltego


C.

Metasploit


D.

theHarvester


Expert Solution
Questions # 63:

During a preengagement activity with a new customer, a penetration tester looks for assets to test. Which of the following is an example of a target that can be used for testing?

Options:

A.

API


B.

HTTP


C.

IPA


D.

ICMP


Expert Solution
Questions # 64:

During a security assessment for an internal corporate network, a penetration tester wants to gain unauthorized access to internal resources by executing an attack that uses software to disguise itself as legitimate software. Which of the following host-based attacks should the tester use?

Options:

A.

On-path


B.

Logic bomb


C.

Rootkit


D.

Buffer overflow


Expert Solution
Questions # 65:

A penetration tester wants to perform static analysis of a Java application. The tester has a copy of the archive file. Which of the following must the tester do first to accomplish this goal?

Options:

A.

Decompile the bytecode.


B.

Perform a fuzz test the archive file.


C.

Convert the archive file to a .so file.


D.

Disassemble the Java interpreter.


Expert Solution
Questions # 66:

During an assessment, a penetration tester wants to extend the vulnerability search to include the use of dynamic testing. Which of the following tools should the tester use?

Options:

A.

Mimikatz


B.

ZAP


C.

OllyDbg


D.

SonarQube


Expert Solution
Questions # 67:

A penetration tester is compiling the final report for a recently completed engagement. A junior QA team member wants to know where they can find details on the impact, overall security findings, and high-level statements. Which of the following sections of the report would most likely contain this information?

Options:

A.

Quality control


B.

Methodology


C.

Executive summary


D.

Risk scoring


Expert Solution
Questions # 68:

A penetration tester is conducting an assessment of a web application ' s login page. The tester needs to determine whether there are any hidden form fields of interest. Which of the following is the most effective technique?

Options:

A.

XSS


B.

On-path attack


C.

SQL injection


D.

HTML scraping


Expert Solution
Questions # 69:

A penetration tester creates a list of target domains that require further enumeration. The tester writes the following script to perform vulnerability scanning across the domains:

line 1: #!/usr/bin/bash

line 2: DOMAINS_LIST = " /path/to/list.txt "

line 3: while read -r i; do

line 4: nikto -h $i -o scan-$i.txt &

line 5: done

The script does not work as intended. Which of the following should the tester do to fix the script?

Options:

A.

Change line 2 to { " domain1 " , " domain2 " , " domain3 " , }.


B.

Change line 3 to while true; read -r i; do.


C.

Change line 4 to nikto $i | tee scan-$i.txt.


D.

Change line 5 to done < " $DOMAINS_LIST " .


Expert Solution
Questions # 70:

During wireless testing, a penetration tester observes the following customer APs and configurations:

SSID / Configuration

AP1 – WPA3

AP2 – WPA3

AP3 – WPA2

AP4 – WPA3

Which of the following attacks can the tester use only against AP3?

Options:

A.

Brute force


B.

Signal jamming


C.

Evil twin


D.

Deauthentication


Expert Solution
Viewing page 7 out of 10 pages
Viewing questions 61-70 out of questions