Free Certification Practice Questions

COMPTIA-PENTEST

Loading…
CompTIA's PT0-003 During a security audit, a penetration tester wants to run a process to gather information about a target network's domain structure and associated IP addresses. Which of the following tools should the tester use?
#91
CompTIA's PT0-003 A penetration tester enumerates a legacy Windows host on the same subnet. The tester needs to select exploit methods that will have the least impact on the host's operating stability. Which of the following commands should the tester try first?
#92
CompTIA's PT0-003 During an assessment, a penetration tester runs the following command:dnscmd.exe /config /serverlevelplugindll C:\users\netadm\Documents\addusr.dllWhich of the following is the penetration tester trying to achieve?
#93
CompTIA's PT0-003 A penetration tester wants to use multiple TTPs to assess the reactions (alerted, blocked, and others) by the client's current security tools. The threat-modeling team indicates the TTPs in the list might effect their internal systems and servers. Which of the following actions would the tester most likely take?
#94
CompTIA's PT0-003 A penetration tester is conducting a vulnerability scan. The tester wants to see any vulnerabilities that may be visible from outside of the organization. Which of the following scans should the penetration tester perform?
#95
CompTIA's PT0-003 During a penetration testing engagement, a tester targets the internet-facing services used by the client. Which of the following describes the type of assessment that should be considered in this scope of work?
#96
CompTIA's PT0-003 A tester wants to pivot from a compromised host to another network with encryption and the least amount of interaction with the compromised host. Which of the following is the best way to accomplish this objective?
#97
CompTIA's PT0-003 A penetration tester identifies an exposed corporate directory containing first and last names and phone number for employees. Which of the following attack techniques would be the most effective to pursue if the penetration tester wants to compromise user accounts?
#98
CompTIA's PT0-003 A penetration tester currently conducts phishing reconnaissance using various tools and accounts for multiple intelligence-gathering platforms. The tester wants to consolidate some of the tools and accounts into one solution to analyze the output from the intelligence-gathering tools. Which of the following is the best tool for the penetration tester to use?
#99
CompTIA's PT0-003 A penetration tester is performing an assessment focused on attacking the authentication identity provider hosted within a cloud provider. During the reconnaissance phase, the tester finds that the system is using OpenID connect with OAuth and has dynamic registration enabled. Which of the following attacks should the tester try first?
#100
CompTIA's PT0-003 A penetration tester is searching for vulnerabilities or misconfigurations on a container environment. Which of the following tools will the tester most likely use to achieve this objective?
#101
CompTIA's PT0-003 A penetration tester completed a report for a new client. Prior to sharing the report with the client, which of the following should the penetration tester request to complete a review?
#102
CompTIA's PT0-003 During a security assessment for an internal corporate network, a penetration tester wants to gain unauthorized access to internal resources by executing an attack that uses software to disguise itself as legitimate software. Which of the following host-based attacks should the tester use?
#103
CompTIA's PT0-003 A penetration tester is performing a network security assessment. The tester wants to intercept communication between two users and then view and potentially modify transmitted data. Which of the following types of on-path attacks would be best to allow the penetration tester to achieve this result?
#104
CompTIA's PT0-003 A penetration tester successfully clones a source code repository and then runs the following command:find . -type f -exec egrep -i "token|key|login" {} \;Which of the following is the penetration tester conducting?
#105
CompTIA's PT0-003 After a recent penetration test was conducted by the company's penetration testing team, a systems administrator notices the following in the logs:2/10/2023 05:50AM C:\users\mgranite\schtasks /query2/10/2023 05:53AM C:\users\mgranite\schtasks /CREATE /SC DAILYWhich of the following best explains the team's objective?
#106
CompTIA's PT0-003 A tester is finishing an engagement and needs to ensure that artifacts resulting from the test are safely handled. Which of the following is the best procedure for maintaining client data privacy?
#107
CompTIA's PT0-003 A penetration tester is working on an engagement in which a main objective is to collect confidential information that could be used to exfiltrate data and perform a ransomware attack. During the engagement, the tester is able to obtain an internal foothold on the target network. Which of the following is the next task the tester should complete to accomplish the objective?
#108
CompTIA's PT0-003 During an external penetration test, a tester receives the following output from a tool:test.comptia.orginfo.comptia.orgvpn.comptia.orgexam.comptia.orgWhich of the following commands did the tester most likely run to get these results?
#109
CompTIA's PT0-003 A penetration tester is trying to get unauthorized access to a web application and execute the following command:Which of the following web application attacks is the tester performing?
#110
CompTIA's PT0-003 A penetration tester has adversely affected a critical system during an engagement, which could have a material impact on the organization. Which of the following should the penetration tester do to address this issue?
#111
CompTIA's PT0-003 A penetration tester must identify vulnerabilities within an ICS that is not connected to the internet or enterprise network. Which of the following should the tester utilize to conduct the testing?
#112
CompTIA's PT0-003 During an assessment, a penetration tester exploits an SQLi vulnerability. Which of the following commands would allow the penetration tester to enumerate password hashes?
#113
CompTIA's PT0-003 A penetration tester is compiling the final report for a recently completed engagement. A junior QA team member wants to know where they can find details on the impact, overall security findings, and high-level statements. Which of the following sections of the report would most likely contain this information?
#114
CompTIA's PT0-003 Which of the following elements in a lock should be aligned to a specific level to allow the key cylinder to turn?
#115
CompTIA's PT0-003 A penetration tester needs to complete cleanup activities from the testing lead. Which of the following should the tester do to ensure that reverse shell payloads are no longer running?
#116
CompTIA's PT0-003 A penetration tester needs to identify all vulnerable input fields on a customer website. Which of the following tools would be best suited to complete this request?
#117
CompTIA's PT0-003 A penetration tester runs a network scan but has some issues accurately enumerating the vulnerabilities due to the following error:OS identification failed -Which of the following is most likely causing this error?
#118
CompTIA's PT0-003 A penetration tester performs an assessment on the target company's Kubernetes cluster using kube-hunter. Which of the following types of vulnerabilities could be detected with the tool?
#119
CompTIA's PT0-003 During a security assessment, a penetration tester wants to compromise user accounts without triggering IDS/IPS detection rules. Which of the following is the most effective way for the tester to accomplish this task?
#120