Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 8 out of 9 pages
Viewing questions 71-80 out of questions
Questions # 71:

During an internal penetration test, the tester uses the following command:

C:\ Invoke-mimikatz.ps1 "kerberos::golden /domain:test.local /sid:S-1-5-21-3234... /target: dc01.test.local /service:CIFS /RC4:237749d82... /user:support.test.local /ptt"

Which of the following best describes the tester’s goal when executing this command?

Options:

A.

Bypassing normal authentication


B.

Enumerating shares


C.

Obtaining current user credentials


D.

Using password spraying


Expert Solution
Questions # 72:

During an assessment, a penetration tester gains a low-privilege shell and then runs the following command:

findstr /SIM /C:"pass" *.txt *.cfg *.xml

Which of the following is the penetration tester trying to enumerate?

Options:

A.

Configuration files


B.

Permissions


C.

Virtual hosts


D.

Secrets


Expert Solution
Questions # 73:

A penetration tester needs to obtain sensitive data from several executives who regularly work while commuting by train. Which of the following methods should the tester use for this task?

Options:

A.

Shoulder surfing


B.

Credential harvesting


C.

Bluetooth spamming


D.

MFA fatigue


Expert Solution
Questions # 74:

Before starting an assessment, a penetration tester needs to scan a Class B IPv4 network for open ports in a short amount of time. Which of the following is the best tool for this task?

Options:

A.

Burp Suite


B.

masscan


C.

Nmap


D.

hping


Expert Solution
Questions # 75:

While conducting OSINT, a penetration tester discovers the client's administrator posted part of an unsanitized firewall configuration to a troubleshooting message board. Which of the following did the penetration tester most likely use?

Options:

A.

HTML scraping


B.

Public code repository scanning


C.

Wayback Machine


D.

Search engine enumeration


Expert Solution
Questions # 76:

A penetration tester gains access to a host but does not have access to any type of shell. Which of the following is the best way for the tester to further enumerate the host and the environment in which it resides?

Options:

A.

ProxyChains


B.

Netcat


C.

PowerShell ISE


D.

Process IDs


Expert Solution
Questions # 77:

A penetration tester would like to leverage a CSRF vulnerability to gather sensitive details from an application's end users. Which of the following tools should the tester use for this task?

Options:

A.

Browser Exploitation Framework


B.

Maltego


C.

Metasploit


D.

theHarvester


Expert Solution
Questions # 78:

A penetration testing team wants to conduct DNS lookups for a set of targets provided by the client. The team crafts a Bash script for this task. However, they find a minor error in one line of the script:

1 #!/bin/bash

2 for i in $(cat example.txt); do

3 curl $i

4 done

Which of the following changes should the team make to line 3 of the script?

Options:

A.

resolvconf $i


B.

rndc $i


C.

systemd-resolve $i


D.

host $i


Expert Solution
Questions # 79:

A tester runs an Nmap scan against a Windows server and receives the following results:

Nmap scan report for win_dns.local (10.0.0.5)

Host is up (0.014s latency)

Port State Service

53/tcp open domain

161/tcp open snmp

445/tcp open smb-ds

3389/tcp open rdp

Which of the following TCP ports should be prioritized for using hash-based relays?

Options:

A.

53


B.

161


C.

445


D.

3389


Expert Solution
Questions # 80:

A penetration tester successfully clones a source code repository and then runs the following command:

find . -type f -exec egrep -i "token|key|login" {} \;

Which of the following is the penetration tester conducting?

Options:

A.

Data tokenization


B.

Secrets scanning


C.

Password spraying


D.

Source code analysis


Expert Solution
Viewing page 8 out of 9 pages
Viewing questions 71-80 out of questions