CompTIA's PT0-003 During a security audit, a penetration tester wants to run a process to gather information about a target network's domain structure and associated IP addresses. Which of the following tools should the tester use?
#91
Answer: A✅ Correct❌ Incorrect
CompTIA's PT0-003 A penetration tester enumerates a legacy Windows host on the same subnet. The tester needs to select exploit methods that will have the least impact on the host's operating stability. Which of the following commands should the tester try first?
#92
Answer: A✅ Correct❌ Incorrect
CompTIA's PT0-003 During an assessment, a penetration tester runs the following command:dnscmd.exe /config /serverlevelplugindll C:\users\netadm\Documents\addusr.dllWhich of the following is the penetration tester trying to achieve?
#93
Answer: B✅ Correct❌ Incorrect
CompTIA's PT0-003 A penetration tester wants to use multiple TTPs to assess the reactions (alerted, blocked, and others) by the client's current security tools. The threat-modeling team indicates the TTPs in the list might effect their internal systems and servers. Which of the following actions would the tester most likely take?
#94
Answer: A✅ Correct❌ Incorrect
CompTIA's PT0-003 A penetration tester is conducting a vulnerability scan. The tester wants to see any vulnerabilities that may be visible from outside of the organization. Which of the following scans should the penetration tester perform?
#95
Answer: C✅ Correct❌ Incorrect
CompTIA's PT0-003 During a penetration testing engagement, a tester targets the internet-facing services used by the client. Which of the following describes the type of assessment that should be considered in this scope of work?
#96
Answer: C✅ Correct❌ Incorrect
CompTIA's PT0-003 A tester wants to pivot from a compromised host to another network with encryption and the least amount of interaction with the compromised host. Which of the following is the best way to accomplish this objective?
#97
Answer: A✅ Correct❌ Incorrect
CompTIA's PT0-003 A penetration tester identifies an exposed corporate directory containing first and last names and phone number for employees. Which of the following attack techniques would be the most effective to pursue if the penetration tester wants to compromise user accounts?
#98
Answer: A✅ Correct❌ Incorrect
CompTIA's PT0-003 A penetration tester currently conducts phishing reconnaissance using various tools and accounts for multiple intelligence-gathering platforms. The tester wants to consolidate some of the tools and accounts into one solution to analyze the output from the intelligence-gathering tools. Which of the following is the best tool for the penetration tester to use?
#99
Answer: C✅ Correct❌ Incorrect
CompTIA's PT0-003 A penetration tester is performing an assessment focused on attacking the authentication identity provider hosted within a cloud provider. During the reconnaissance phase, the tester finds that the system is using OpenID connect with OAuth and has dynamic registration enabled. Which of the following attacks should the tester try first?
#100
Answer: C✅ Correct❌ Incorrect
CompTIA's PT0-003 A penetration tester is searching for vulnerabilities or misconfigurations on a container environment. Which of the following tools will the tester most likely use to achieve this objective?
#101
Answer: B✅ Correct❌ Incorrect
CompTIA's PT0-003 A penetration tester completed a report for a new client. Prior to sharing the report with the client, which of the following should the penetration tester request to complete a review?
#102
Answer: D✅ Correct❌ Incorrect
CompTIA's PT0-003 During a security assessment for an internal corporate network, a penetration tester wants to gain unauthorized access to internal resources by executing an attack that uses software to disguise itself as legitimate software. Which of the following host-based attacks should the tester use?
#103
Answer: C✅ Correct❌ Incorrect
CompTIA's PT0-003 A penetration tester is performing a network security assessment. The tester wants to intercept communication between two users and then view and potentially modify transmitted data. Which of the following types of on-path attacks would be best to allow the penetration tester to achieve this result?
#104
Answer: B✅ Correct❌ Incorrect
CompTIA's PT0-003 A penetration tester successfully clones a source code repository and then runs the following command:find . -type f -exec egrep -i "token|key|login" {} \;Which of the following is the penetration tester conducting?
#105
Answer: B✅ Correct❌ Incorrect
CompTIA's PT0-003 After a recent penetration test was conducted by the company's penetration testing team, a systems administrator notices the following in the logs:2/10/2023 05:50AM C:\users\mgranite\schtasks /query2/10/2023 05:53AM C:\users\mgranite\schtasks /CREATE /SC DAILYWhich of the following best explains the team's objective?
#106
Answer: D✅ Correct❌ Incorrect
CompTIA's PT0-003 A tester is finishing an engagement and needs to ensure that artifacts resulting from the test are safely handled. Which of the following is the best procedure for maintaining client data privacy?
#107
Answer: B✅ Correct❌ Incorrect
CompTIA's PT0-003 A penetration tester is working on an engagement in which a main objective is to collect confidential information that could be used to exfiltrate data and perform a ransomware attack. During the engagement, the tester is able to obtain an internal foothold on the target network. Which of the following is the next task the tester should complete to accomplish the objective?
#108
Answer: B✅ Correct❌ Incorrect
CompTIA's PT0-003 During an external penetration test, a tester receives the following output from a tool:test.comptia.orginfo.comptia.orgvpn.comptia.orgexam.comptia.orgWhich of the following commands did the tester most likely run to get these results?
#109
Answer: B✅ Correct❌ Incorrect
CompTIA's PT0-003 A penetration tester is trying to get unauthorized access to a web application and execute the following command:Which of the following web application attacks is the tester performing?
#110
Answer: C✅ Correct❌ Incorrect
CompTIA's PT0-003 A penetration tester has adversely affected a critical system during an engagement, which could have a material impact on the organization. Which of the following should the penetration tester do to address this issue?
#111
Answer: C✅ Correct❌ Incorrect
CompTIA's PT0-003 A penetration tester must identify vulnerabilities within an ICS that is not connected to the internet or enterprise network. Which of the following should the tester utilize to conduct the testing?
#112
Answer: D✅ Correct❌ Incorrect
CompTIA's PT0-003 During an assessment, a penetration tester exploits an SQLi vulnerability. Which of the following commands would allow the penetration tester to enumerate password hashes?
#113
Answer: B✅ Correct❌ Incorrect
CompTIA's PT0-003 A penetration tester is compiling the final report for a recently completed engagement. A junior QA team member wants to know where they can find details on the impact, overall security findings, and high-level statements. Which of the following sections of the report would most likely contain this information?
#114
Answer: C✅ Correct❌ Incorrect
CompTIA's PT0-003 Which of the following elements in a lock should be aligned to a specific level to allow the key cylinder to turn?
#115
Answer: B✅ Correct❌ Incorrect
CompTIA's PT0-003 A penetration tester needs to complete cleanup activities from the testing lead. Which of the following should the tester do to ensure that reverse shell payloads are no longer running?
#116
Answer: A✅ Correct❌ Incorrect
CompTIA's PT0-003 A penetration tester needs to identify all vulnerable input fields on a customer website. Which of the following tools would be best suited to complete this request?
#117
Answer: A✅ Correct❌ Incorrect
CompTIA's PT0-003 A penetration tester runs a network scan but has some issues accurately enumerating the vulnerabilities due to the following error:OS identification failed -Which of the following is most likely causing this error?
#118
Answer: D✅ Correct❌ Incorrect
CompTIA's PT0-003 A penetration tester performs an assessment on the target company's Kubernetes cluster using kube-hunter. Which of the following types of vulnerabilities could be detected with the tool?
#119
Answer: B✅ Correct❌ Incorrect
CompTIA's PT0-003 During a security assessment, a penetration tester wants to compromise user accounts without triggering IDS/IPS detection rules. Which of the following is the most effective way for the tester to accomplish this task?