Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 8 out of 8 pages
Viewing questions 71-80 out of questions
Questions # 71:

A penetration tester launches an attack against company employees. The tester clones the company's intranet login page and sends the link via email to all employees.

Which of the following best describes the objective and tool selected by the tester to perform this activity?

Options:

A.

Gaining remote access using BeEF


B.

Obtaining the list of email addresses using theHarvester


C.

Harvesting credentials using SET


D.

Launching a phishing campaign using GoPhish


Expert Solution
Questions # 72:

A consultant starts a network penetration test. The consultant uses a laptop that is hardwired to the network to try to assess the network with the appropriate tools. Which of the following should the consultant engage first?

Options:

A.

Service discovery


B.

OS fingerprinting


C.

Host discovery


D.

DNS enumeration


Expert Solution
Questions # 73:

A penetration tester is conducting a wireless security assessment for a client with 2.4GHz and 5GHz access points. The tester places a wireless USB dongle in the laptop to start capturing WPA2 handshakes. Which of the following steps should the tester take next?

Options:

A.

Enable monitoring mode using Aircrack-ng.


B.

Use Kismet to automatically place the wireless dongle in monitor mode and collect handshakes.


C.

Run KARMA to break the password.


D.

Research WiGLE.net for potential nearby client access points.


Expert Solution
Questions # 74:

With one day left to complete the testing phase of an engagement, a penetration tester obtains the following results from an Nmap scan:

Not shown: 1670 closed ports

PORT STATE SERVICE VERSION

80/tcp open http Apache httpd 2.2.3 (CentOS)

3306/tcp open mysql MySQL (unauthorized)

8888/tcp open http lighttpd 1.4.32

Which of the following tools should the tester use to quickly identify a potential attack path?

Options:

A.

msfvenom


B.

SearchSploit


C.

sqlmap


D.

BeEF


Expert Solution
Questions # 75:

During an assessment, a penetration tester runs the following command:

dnscmd.exe /config /serverlevelplugindll C:\users\necad-TA\Documents\adduser.dll

Which of the following is the penetration tester trying to achieve?

Options:

A.

DNS enumeration


B.

Privilege escalation


C.

Command injection


D.

A list of available users


Expert Solution
Viewing page 8 out of 8 pages
Viewing questions 71-80 out of questions