ExamGecko
Home Home / CompTIA / PT0-002

CompTIA PT0-002 Practice Test - Questions Answers, Page 20

Question list
Search
Search

List of questions

Search

Related questions











A penetration tester gains access to a system and is able to migrate to a user process:

Given the output above, which of the following actions is the penetration tester performing?

(Choose two.)

A.
Redirecting output from a file to a remote system
A.
Redirecting output from a file to a remote system
Answers
B.
Building a scheduled task for execution
B.
Building a scheduled task for execution
Answers
C.
Mapping a share to a remote system
C.
Mapping a share to a remote system
Answers
D.
Executing a file on the remote system
D.
Executing a file on the remote system
Answers
E.
Creating a new process on all domain systems
E.
Creating a new process on all domain systems
Answers
F.
Setting up a reverse shell from a remote system
F.
Setting up a reverse shell from a remote system
Answers
G.
Adding an additional IP address on the compromised system
G.
Adding an additional IP address on the compromised system
Answers
Suggested answer: C, D

Explanation:

WMIC.exe is a built-in Microsoft program that allows command-line access to the Windows Management Instrumentation. Using this tool, administrators can query the operating system for detailed information about installed hardware and Windows settings, run management tasks, and even execute other programs or commands.

After gaining access to a previous system, a penetration tester runs an Nmap scan against a network with the following results:

The tester then runs the following command from the previous exploited system, which fails:

Which of the following explains the reason why the command failed?

A.
The tester input the incorrect IP address.
A.
The tester input the incorrect IP address.
Answers
B.
The command requires the ?-port 135 option.
B.
The command requires the ?-port 135 option.
Answers
C.
An account for RDP does not exist on the server.
C.
An account for RDP does not exist on the server.
Answers
D.
PowerShell requires administrative privilege.
D.
PowerShell requires administrative privilege.
Answers
Suggested answer: C

Which of the following assessment methods is MOST likely to cause harm to an ICS environment?

A.
Active scanning
A.
Active scanning
Answers
B.
Ping sweep
B.
Ping sweep
Answers
C.
Protocol reversing
C.
Protocol reversing
Answers
D.
Packet analysis
D.
Packet analysis
Answers
Suggested answer: A

During a penetration test, a tester is in close proximity to a corporate mobile device belonging to a network administrator that is broadcasting Bluetooth frames.

Which of the following is an example of a Bluesnarfing attack that the penetration tester can perform?

A.
Sniff and then crack the WPS PIN on an associated WiFi device.
A.
Sniff and then crack the WPS PIN on an associated WiFi device.
Answers
B.
Dump the user address book on the device.
B.
Dump the user address book on the device.
Answers
C.
Break a connection between two Bluetooth devices.
C.
Break a connection between two Bluetooth devices.
Answers
D.
Transmit text messages to the device.
D.
Transmit text messages to the device.
Answers
Suggested answer: B

Explanation:

Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs. This allows access to calendars, contact lists, emails and text messages, and on some phones, users can copy pictures and private videos.

A software company has hired a security consultant to assess the security of the company's software development practices. The consultant opts to begin reconnaissance by performing fuzzing on a software binary. Which of the following vulnerabilities is the security consultant MOST likely to identify?

A.
Weak authentication schemes
A.
Weak authentication schemes
Answers
B.
Credentials stored in strings
B.
Credentials stored in strings
Answers
C.
Buffer overflows
C.
Buffer overflows
Answers
D.
Non-optimized resource management
D.
Non-optimized resource management
Answers
Suggested answer: C

Explanation:

fuzzing introduces unexpected inputs into a system and watches to see if the system has any negative reactions to the inputs that indicate security, performance, or quality gaps or issues

A penetration tester has prepared the following phishing email for an upcoming penetration test:

Which of the following is the penetration tester using MOST to influence phishing targets to click on the link?

A.
Familiarity and likeness
A.
Familiarity and likeness
Answers
B.
Authority and urgency
B.
Authority and urgency
Answers
C.
Scarcity and fear
C.
Scarcity and fear
Answers
D.
Social proof and greed
D.
Social proof and greed
Answers
Suggested answer: B

During a penetration test, a tester is able to change values in the URL from example.com/login.php?id=5 to example.com/login.php?id=10 and gain access to a web application.

Which of the following vulnerabilities has the penetration tester exploited?

A.
Command injection
A.
Command injection
Answers
B.
Broken authentication
B.
Broken authentication
Answers
C.
Direct object reference
C.
Direct object reference
Answers
D.
Cross-site scripting
D.
Cross-site scripting
Answers
Suggested answer: C

Explanation:

Insecure direct object reference (IDOR) is a vulnerability where the developer of the application does not implement authorization features to verify that someone accessing data on the site is allowed to access that data.

Which of the following situations would MOST likely warrant revalidation of a previous security assessment?

A.
After detection of a breach
A.
After detection of a breach
Answers
B.
After a merger or an acquisition
B.
After a merger or an acquisition
Answers
C.
When an organization updates its network firewall configurations
C.
When an organization updates its network firewall configurations
Answers
D.
When most of the vulnerabilities have been remediated
D.
When most of the vulnerabilities have been remediated
Answers
Suggested answer: D

A penetration tester downloaded a Java application file from a compromised web server and identifies how to invoke it by looking at the following log:

Which of the following is the order of steps the penetration tester needs to follow to validate whether the Java application uses encryption over sockets?

A.
Run an application vulnerability scan and then identify the TCP ports used by the application.
A.
Run an application vulnerability scan and then identify the TCP ports used by the application.
Answers
B.
Run the application attached to a debugger and then review the application's log.
B.
Run the application attached to a debugger and then review the application's log.
Answers
C.
Disassemble the binary code and then identify the break points.
C.
Disassemble the binary code and then identify the break points.
Answers
D.
Start a packet capture with Wireshark and then run the application.
D.
Start a packet capture with Wireshark and then run the application.
Answers
Suggested answer: D

When planning a penetration-testing effort, clearly expressing the rules surrounding the optimal time of day for test execution is important because:

A.
security compliance regulations or laws may be violated.
A.
security compliance regulations or laws may be violated.
Answers
B.
testing can make detecting actual APT more challenging.
B.
testing can make detecting actual APT more challenging.
Answers
C.
testing adds to the workload of defensive cyber- and threat-hunting teams.
C.
testing adds to the workload of defensive cyber- and threat-hunting teams.
Answers
D.
business and network operations may be impacted.
D.
business and network operations may be impacted.
Answers
Suggested answer: D
Total 422 questions
Go to page: of 43