Exam 12: CompTIA PenTest+ Certification Exam
Exam 1: CompTIA A+ Certification Exam: Core 1471 Questions
Exam 2: CompTIA A+ Certification Exam: Core 2409 Questions
Exam 3: CompTIA Advanced Security Practitioner (CASP+) CAS-003442 Questions
Exam 4: CompTIA Advanced Security Practitioner (CASP+) CAS-004107 Questions
Exam 5: CompTIA Cloud Essentials+165 Questions
Exam 6: CompTIA CySA+ Certification Exam (CS0-002)294 Questions
Exam 7: CompTIA Cloud+ (CV0-002)48 Questions
Exam 8: CompTIA Cloud+67 Questions
Exam 9: CompTIA IT Fundamentals387 Questions
Exam 10: CompTIA Network+829 Questions
Exam 11: CompTIA Project+540 Questions
Exam 12: CompTIA PenTest+ Certification Exam165 Questions
Exam 13: CompTIA Server+66 Questions
Exam 14: CompTIA Server+ Certification Exam779 Questions
Exam 15: CompTIA Security+1 k+ Questions
Exam 16: CompTIA Security+ 2021129 Questions
Exam 17: CompTIA CTT+ Essentials378 Questions
Exam 18: CompTIA Linux+252 Questions
Select questions type
A tester has determined that null sessions are enabled on a domain controller. Which of the following attacks can be performed to leverage this vulnerability?
(Multiple Choice)
4.9/5
(38)
A security assessor is attempting to craft specialized XML files to test the security of the parsing functions during ingest into a Windows application. Before beginning to test the application, which of the following should the assessor request from the organization?
(Multiple Choice)
4.8/5
(39)
A senior employee received a suspicious email from another executive requesting an urgent wire transfer. Which of the following types of attacks is likely occurring?
(Multiple Choice)
4.9/5
(29)
Joe, an attacker, intends to transfer funds discreetly from a victim's account to his own. Which of the following URLs can he use to accomplish this attack?
(Multiple Choice)
4.8/5
(38)
A client is asking a penetration tester to evaluate a new web application for availability. Which of the following types of attacks should the tester use?
(Multiple Choice)
4.9/5
(36)
Which of the following are MOST important when planning for an engagement? (Select TWO).
(Multiple Choice)
5.0/5
(30)
A penetration tester is reviewing a Zigbee implementation for security issues. Which of the following device types is the tester MOST likely testing?
(Multiple Choice)
4.8/5
(35)
In which of the following scenarios would a tester perform a Kerberoasting attack?
(Multiple Choice)
4.9/5
(36)
Which of the following can be used to perform online password attacks against RDP?
(Multiple Choice)
4.8/5
(46)
A penetration tester has successfully deployed an evil twin and is starting to see some victim traffic. The next step the penetration tester wants to take is to capture all the victim web traffic unencrypted. Which of the following would BEST meet this goal?
(Multiple Choice)
4.7/5
(35)
A client's systems administrator requests a copy of the report from the penetration tester, but the systems administrator is not listed as a point of contact or signatory. Which of the following is the penetration tester's BEST course of action?
(Multiple Choice)
4.8/5
(45)
A consultant is attempting to harvest credentials from unsecure network protocols in use by the organization. Which of the following commands should the consultant use?
(Multiple Choice)
4.8/5
(39)
Which of the following vulnerabilities are MOST likely to be false positives when reported by an automated scanner on a static HTML web page? (Choose two.)
(Multiple Choice)
4.9/5
(42)
A penetration tester is preparing to conduct API testing. Which of the following would be MOST helpful in preparing for this engagement?
(Multiple Choice)
4.8/5
(35)
A penetration tester successfully exploits a DMZ server that appears to be listening on an outbound port. The penetration tester wishes to forward that traffic back to a device. Which of the following are the BEST tools to use for this purpose? (Choose two.)
(Multiple Choice)
4.9/5
(40)
The following command is run on a Linux file system: chmod 4111 /usr/bin/sudo Which of the following issues may be exploited now?
(Multiple Choice)
4.8/5
(37)
A penetration tester discovers an anonymous FTP server that is sharing the C:\drive. Which of the following is the BEST exploit?
(Multiple Choice)
4.8/5
(33)
Which of the following BEST describes some significant security weaknesses with an ICS, such as those used in electrical utility facilities, natural gas facilities, dams, and nuclear facilities?
(Multiple Choice)
4.8/5
(40)
A penetration tester has been asked to conduct OS fingering with Nmap using a company-provided text file that contains a list of IP addresses. Which of the following are needed to conduct this scan? (Choose two.).
(Multiple Choice)
4.7/5
(33)
A penetration tester successfully exploits a system, receiving a reverse shell. Which of the following is a Meterpreter command that is used to harvest locally stored credentials?
(Multiple Choice)
4.8/5
(32)
Showing 141 - 160 of 165
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)