Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Certification
Study Set
Computing Technology Industry Association (CompTIA)
Exam 12: CompTIA PenTest+ Certification Exam
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 141
Multiple Choice
A tester has determined that null sessions are enabled on a domain controller. Which of the following attacks can be performed to leverage this vulnerability?
Question 142
Multiple Choice
A security assessor is attempting to craft specialized XML files to test the security of the parsing functions during ingest into a Windows application. Before beginning to test the application, which of the following should the assessor request from the organization?
Question 143
Multiple Choice
A senior employee received a suspicious email from another executive requesting an urgent wire transfer. Which of the following types of attacks is likely occurring?
Question 144
Multiple Choice
Joe, an attacker, intends to transfer funds discreetly from a victim's account to his own. Which of the following URLs can he use to accomplish this attack?
Question 145
Multiple Choice
A client is asking a penetration tester to evaluate a new web application for availability. Which of the following types of attacks should the tester use?
Question 146
Multiple Choice
Which of the following are MOST important when planning for an engagement? (Select TWO) .
Question 147
Multiple Choice
A penetration tester is reviewing a Zigbee implementation for security issues. Which of the following device types is the tester MOST likely testing?
Question 148
Multiple Choice
In which of the following scenarios would a tester perform a Kerberoasting attack?
Question 149
Multiple Choice
Which of the following can be used to perform online password attacks against RDP?
Question 150
Multiple Choice
A penetration tester has successfully deployed an evil twin and is starting to see some victim traffic. The next step the penetration tester wants to take is to capture all the victim web traffic unencrypted. Which of the following would BEST meet this goal?
Question 151
Multiple Choice
A client's systems administrator requests a copy of the report from the penetration tester, but the systems administrator is not listed as a point of contact or signatory. Which of the following is the penetration tester's BEST course of action?
Question 152
Multiple Choice
A consultant is attempting to harvest credentials from unsecure network protocols in use by the organization. Which of the following commands should the consultant use?
Question 153
Multiple Choice
Which of the following vulnerabilities are MOST likely to be false positives when reported by an automated scanner on a static HTML web page? (Choose two.)
Question 154
Multiple Choice
A penetration tester is preparing to conduct API testing. Which of the following would be MOST helpful in preparing for this engagement?
Question 155
Multiple Choice
A penetration tester successfully exploits a DMZ server that appears to be listening on an outbound port. The penetration tester wishes to forward that traffic back to a device. Which of the following are the BEST tools to use for this purpose? (Choose two.)
Question 156
Multiple Choice
The following command is run on a Linux file system: chmod 4111 /usr/bin/sudo Which of the following issues may be exploited now?
Question 157
Multiple Choice
A penetration tester discovers an anonymous FTP server that is sharing the C:\drive. Which of the following is the BEST exploit?
Question 158
Multiple Choice
Which of the following BEST describes some significant security weaknesses with an ICS, such as those used in electrical utility facilities, natural gas facilities, dams, and nuclear facilities?
Question 159
Multiple Choice
A penetration tester has been asked to conduct OS fingering with Nmap using a company-provided text file that contains a list of IP addresses. Which of the following are needed to conduct this scan? (Choose two.) .