Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 7 out of 8 pages
Viewing questions 61-70 out of questions
Questions # 61:

A penetration tester is getting ready to conduct a vulnerability scan as part of the testing process. The tester will evaluate an environment that consists of a container orchestration cluster. Which of the following tools should the tester use to evaluate the cluster?

Options:

A.

Trivy


B.

Nessus


C.

Grype


D.

Kube-hunter


Expert Solution
Questions # 62:

During a security assessment, a penetration tester captures plaintext login credentials on the communication between a user and an authentication system. The tester wants to use this information for further unauthorized access.

Which of the following tools is the tester using?

Options:

A.

Burp Suite


B.

Wireshark


C.

Zed Attack Proxy (ZAP)


D.

Metasploit


Expert Solution
Questions # 63:

During a web application assessment, a penetration tester identifies an input field that allows JavaScript injection. The tester inserts a line of JavaScript that results in a prompt, presenting a text box when browsing to the page going forward. Which of the following types of attacks is this an example of?

Options:

A.

SQL injection


B.

SSRF


C.

XSS


D.

Server-side template injection


Expert Solution
Questions # 64:

A client recently hired a penetration testing firm to conduct an assessment of their consumer-facing web application. Several days into the assessment, the client's networking team observes a substantial increase in DNS traffic. Which of the following would most likely explain the increase in DNS traffic?

Options:

A.

Covert data exfiltration


B.

URL spidering


C.

HTML scrapping


D.

DoS attack


Expert Solution
Questions # 65:

A penetration tester completes a scan and sees the following output on a host:

bash

Copy code

Nmap scan report for victim (10.10.10.10)

Host is up (0.0001s latency)

PORT STATE SERVICE

161/udp open|filtered snmp

445/tcp open microsoft-ds

3389/tcp open microsoft-ds

Running Microsoft Windows 7

OS CPE: cpe:/o:microsoft:windows_7_sp0

The tester wants to obtain shell access. Which of the following related exploits should the tester try first?

Options:

A.

exploit/windows/smb/psexec


B.

exploit/windows/smb/ms08_067_netapi


C.

exploit/windows/smb/ms17_010_eternalblue


D.

auxiliary/scanner/snmp/snmp_login


Expert Solution
Questions # 66:

A penetration tester needs to test a very large number of URLs for public access. Given the following code snippet:

1 import requests

2 import pathlib

3

4 for url in pathlib.Path("urls.txt").read_text().split("\n"):

5 response = requests.get(url)

6 if response.status == 401:

7 print("URL accessible")

Which of the following changes is required?

Options:

A.

The condition on line 6


B.

The method on line 5


C.

The import on line 1


D.

The delimiter in line 3


Expert Solution
Questions # 67:

A penetration tester gains access to the target network and observes a running SSH server.

Which of the following techniques should the tester use to obtain the version of SSH running on the target server?

Options:

A.

Network sniffing


B.

IP scanning


C.

Banner grabbing


D.

DNS enumeration


Expert Solution
Questions # 68:

A tester gains initial access to a server and needs to enumerate all corporate domain DNS records. Which of the following commands should the tester use?

Options:

A.

dig +short A AAAA local.domain


B.

nslookup local.domain


C.

dig axfr @local.dns.server


D.

nslookup -server local.dns.server local.domain *


Expert Solution
Questions # 69:

A penetration tester is conducting an assessment of a web application's login page. The tester needs to determine whether there are any hidden form fields of interest. Which of the following is the most effective technique?

Options:

A.

XSS


B.

On-path attack


C.

SQL injection


D.

HTML scraping


Expert Solution
Questions # 70:

A penetration tester finished a security scan and uncovered numerous vulnerabilities on several hosts. Based on the targets' EPSS and CVSS scores, which of the following targets is the most likely to get attacked?

Host | CVSS | EPSS

Target 1 | 4 | 0.6

Target 2 | 2 | 0.3

Target 3 | 1 | 0.6

Target 4 | 4.5 | 0.4

Options:

A.

Target 1: CVSS Score = 4 and EPSS Score = 0.6


B.

Target 2: CVSS Score = 2 and EPSS Score = 0.3


C.

Target 3: CVSS Score = 1 and EPSS Score = 0.6


D.

Target 4: CVSS Score = 4.5 and EPSS Score = 0.4


Expert Solution
Viewing page 7 out of 8 pages
Viewing questions 61-70 out of questions