Exam 12: CompTIA PenTest+ Certification Exam

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A tester has determined that null sessions are enabled on a domain controller. Which of the following attacks can be performed to leverage this vulnerability?

(Multiple Choice)
4.9/5
(38)

A security assessor is attempting to craft specialized XML files to test the security of the parsing functions during ingest into a Windows application. Before beginning to test the application, which of the following should the assessor request from the organization?

(Multiple Choice)
4.8/5
(39)

A senior employee received a suspicious email from another executive requesting an urgent wire transfer. Which of the following types of attacks is likely occurring?

(Multiple Choice)
4.9/5
(29)

Joe, an attacker, intends to transfer funds discreetly from a victim's account to his own. Which of the following URLs can he use to accomplish this attack?

(Multiple Choice)
4.8/5
(38)

A client is asking a penetration tester to evaluate a new web application for availability. Which of the following types of attacks should the tester use?

(Multiple Choice)
4.9/5
(36)

Which of the following are MOST important when planning for an engagement? (Select TWO).

(Multiple Choice)
5.0/5
(30)

A penetration tester is reviewing a Zigbee implementation for security issues. Which of the following device types is the tester MOST likely testing?

(Multiple Choice)
4.8/5
(35)

In which of the following scenarios would a tester perform a Kerberoasting attack?

(Multiple Choice)
4.9/5
(36)

Which of the following can be used to perform online password attacks against RDP?

(Multiple Choice)
4.8/5
(46)

A penetration tester has successfully deployed an evil twin and is starting to see some victim traffic. The next step the penetration tester wants to take is to capture all the victim web traffic unencrypted. Which of the following would BEST meet this goal?

(Multiple Choice)
4.7/5
(35)

A client's systems administrator requests a copy of the report from the penetration tester, but the systems administrator is not listed as a point of contact or signatory. Which of the following is the penetration tester's BEST course of action?

(Multiple Choice)
4.8/5
(45)

A consultant is attempting to harvest credentials from unsecure network protocols in use by the organization. Which of the following commands should the consultant use?

(Multiple Choice)
4.8/5
(39)

Which of the following vulnerabilities are MOST likely to be false positives when reported by an automated scanner on a static HTML web page? (Choose two.)

(Multiple Choice)
4.9/5
(42)

A penetration tester is preparing to conduct API testing. Which of the following would be MOST helpful in preparing for this engagement?

(Multiple Choice)
4.8/5
(35)

A penetration tester successfully exploits a DMZ server that appears to be listening on an outbound port. The penetration tester wishes to forward that traffic back to a device. Which of the following are the BEST tools to use for this purpose? (Choose two.)

(Multiple Choice)
4.9/5
(40)

The following command is run on a Linux file system: chmod 4111 /usr/bin/sudo Which of the following issues may be exploited now?

(Multiple Choice)
4.8/5
(37)

A penetration tester discovers an anonymous FTP server that is sharing the C:\drive. Which of the following is the BEST exploit?

(Multiple Choice)
4.8/5
(33)

Which of the following BEST describes some significant security weaknesses with an ICS, such as those used in electrical utility facilities, natural gas facilities, dams, and nuclear facilities?

(Multiple Choice)
4.8/5
(40)

A penetration tester has been asked to conduct OS fingering with Nmap using a company-provided text file that contains a list of IP addresses. Which of the following are needed to conduct this scan? (Choose two.).

(Multiple Choice)
4.7/5
(33)

A penetration tester successfully exploits a system, receiving a reverse shell. Which of the following is a Meterpreter command that is used to harvest locally stored credentials?

(Multiple Choice)
4.8/5
(32)
Showing 141 - 160 of 165
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)