ExamGecko
Home Home / CompTIA / PT0-002

CompTIA PT0-002 Practice Test - Questions Answers, Page 24

Question list
Search
Search

List of questions

Search

Related questions











The following PowerShell snippet was extracted from a log of an attacker machine:

A penetration tester would like to identify the presence of an array. Which of the following line numbers would define the array?

A.
Line 8
A.
Line 8
Answers
B.
Line 13
B.
Line 13
Answers
C.
Line 19
C.
Line 19
Answers
D.
Line 20
D.
Line 20
Answers
Suggested answer: A

Explanation:

$X=2,4,6,8,9,20,5

$y=[System.Collections.ArrayList]$X

$y.RemoveRange(1,2) As you can see the arrat has no brackets and no periods. IT HAS SEMICOLLINS

TO SEPERATE THE LISTED ITEMS OR VALUES.

A company provided the following network scope for a penetration test:

169.137.1.0/24

221.10.1.0/24

149.14.1.0/24

A penetration tester discovered a remote command injection on IP address 149.14.1.24 and exploited the system. Later, the tester learned that this particular IP address belongs to a third party.

Which of the following stakeholders is responsible for this mistake?

A.
The company that requested the penetration test
A.
The company that requested the penetration test
Answers
B.
The penetration testing company
B.
The penetration testing company
Answers
C.
The target host's owner
C.
The target host's owner
Answers
D.
The penetration tester
D.
The penetration tester
Answers
E.
The subcontractor supporting the test
E.
The subcontractor supporting the test
Answers
Suggested answer: A

Explanation:

The company that requested the penetration test is responsible for providing the correct and accurate network scope for the test. The network scope defines the boundaries and limitations of the test, such as which IP addresses, domains, systems, or networks are in scope or out of scope. If the company provided an incorrect network scope that included an IP address that belongs to a third party, then it is responsible for this mistake. The penetration testing company, the target host's owner, the penetration tester, and the subcontractor supporting the test are not responsible for this mistake, as they relied on the network scope provided by the company that requested the penetration test.

During the reconnaissance phase, a penetration tester obtains the following output:

Reply from 192.168.1.23: bytes=32 time<54ms TTL=128

Reply from 192.168.1.23: bytes=32 time<53ms TTL=128

Reply from 192.168.1.23: bytes=32 time<60ms TTL=128

Reply from 192.168.1.23: bytes=32 time<51ms TTL=128

Which of the following operating systems is MOST likely installed on the host?

A.
Linux
A.
Linux
Answers
B.
NetBSD
B.
NetBSD
Answers
C.
Windows
C.
Windows
Answers
D.
macOS
D.
macOS
Answers
Suggested answer: C

Explanation:

The output shows the result of a ping command, which sends packets to a host and receives replies. The ping command can be used to determine if a host is alive and reachable on the network. One of the information that the ping command displays is the Time to Live (TTL) value, which indicates how many hops a packet can travel before it is discarded. The TTL value can also be used to guess the operating system of the host, as different operating systems have different default TTL values. In this case, the TTL value is 128, which is the default value for Windows operating systems. Linux and macOS have a default TTL value of 64, while NetBSD has a default TTL value of 255.

A penetration tester joins the assessment team in the middle of the assessment. The client has asked the team, both verbally and in the scoping document, not to test the production networks. However, the new tester is not aware of this request and proceeds to perform exploits in the production environment. Which of the following would have MOST effectively prevented this misunderstanding?

A.
Prohibiting exploitation in the production environment
A.
Prohibiting exploitation in the production environment
Answers
B.
Requiring all testers to review the scoping document carefully
B.
Requiring all testers to review the scoping document carefully
Answers
C.
Never assessing the production networks
C.
Never assessing the production networks
Answers
D.
Prohibiting testers from joining the team during the assessment
D.
Prohibiting testers from joining the team during the assessment
Answers
Suggested answer: B

Explanation:

The scoping document is a document that defines the objectives, scope, limitations, deliverables, and expectations of a penetration testing engagement. It is an essential document that guides the penetration testing process and ensures that both the tester and the client agree on the terms and conditions of the test. Requiring all testers to review the scoping document carefully would have most effectively prevented this misunderstanding, as it would have informed the new tester about the client's request not to test the production networks. The other options are not effective or realistic ways to prevent this misunderstanding.

A penetration tester attempted a DNS poisoning attack. After the attempt, no traffic was seen from the target machine. Which of the following MOST likely caused the attack to fail?

A.
The injection was too slow.
A.
The injection was too slow.
Answers
B.
The DNS information was incorrect.
B.
The DNS information was incorrect.
Answers
C.
The DNS cache was not refreshed.
C.
The DNS cache was not refreshed.
Answers
D.
The client did not receive a trusted response.
D.
The client did not receive a trusted response.
Answers
Suggested answer: C

Explanation:

A DNS poisoning attack is an attack that exploits a vulnerability in the DNS protocol or system to redirect traffic from legitimate websites to malicious ones. A DNS poisoning attack works by injecting false DNS records into a DNS server or resolver's cache, which is a temporary storage of DNS information. However, if the DNS cache was not refreshed, then the attack would fail, as the target machine would still use the old and valid DNS records from its cache. The other options are not likely causes of the attack failure.

During an assessment, a penetration tester was able to access the organization's wireless network from outside of the building using a laptop running Aircrack-ng. Which of the following should be recommended to the client to remediate this issue?

A.
Changing to Wi-Fi equipment that supports strong encryption
A.
Changing to Wi-Fi equipment that supports strong encryption
Answers
B.
Using directional antennae
B.
Using directional antennae
Answers
C.
Using WEP encryption
C.
Using WEP encryption
Answers
D.
Disabling Wi-Fi
D.
Disabling Wi-Fi
Answers
Suggested answer: A

Explanation:

If a penetration tester was able to access the organization's wireless network from outside of the building using Aircrack-ng, then it means that the wireless network was not secured with strong encryption or authentication methods. Aircrack-ng is a tool that can crack weak wireless encryption schemes such as WEP or WPA-PSK using various techniques such as packet capture, injection, replay, and brute force. To remediate this issue, the client should change to Wi-Fi equipment that supports strong encryption such as WPA2 or WPA3, which are more resistant to cracking attacks. Using directional antennae may reduce the signal range of the wireless network, but it would not prevent an attacker who is within range from cracking the encryption. Using WEP encryption is not a good recommendation, as WEP is known to be insecure and vulnerable to Aircrack-ng attacks. Disabling Wi-Fi may eliminate the risk of wireless attacks, but it would also eliminate the benefits of wireless connectivity for the organization.

A penetration tester is conducting a penetration test and discovers a vulnerability on a web server that is owned by the client. Exploiting the vulnerability allows the tester to open a reverse shell.

Enumerating the server for privilege escalation, the tester discovers the following:

Which of the following should the penetration tester do NEXT?

A.
Close the reverse shell the tester is using.
A.
Close the reverse shell the tester is using.
Answers
B.
Note this finding for inclusion in the final report.
B.
Note this finding for inclusion in the final report.
Answers
C.
Investigate the high numbered port connections.
C.
Investigate the high numbered port connections.
Answers
D.
Contact the client immediately.
D.
Contact the client immediately.
Answers
Suggested answer: C

Explanation:

The image shows the output of the netstat -antu command, which displays active internet connections for the TCP and UDP protocols. The output shows that there are four established TCP connections and two listening UDP connections on the host. The established TCP connections have high numbered ports as their local addresses, such as 49152, 49153, 49154, and 49155. These ports are in the range of ephemeral ports, which are dynamically assigned by the operating system for temporary use by applications or processes. The foreign addresses of these connections are also high numbered ports, such as 4433, 4434, 4435, and 4436. These ports are not well-known or registered ports for any common service or protocol. The combination of high numbered ports for both local and foreign addresses suggests that these connections are suspicious and may indicate a backdoor or a covert channel on the host. Therefore, the penetration tester should investigate these connections next to determine their nature and purpose. The other options are not appropriate actions for the penetration tester at this stage.

A penetration tester successfully performed an exploit on a host and was able to hop from VLAN 100 to VLAN 200. VLAN 200 contains servers that perform financial transactions, and the penetration tester now wants the local interface of the attacker machine to have a static ARP entry in the local cache. The attacker machine has the following:

IP Address: 192.168.1.63

Physical Address: 60-36-dd-a6-c5-33

Which of the following commands would the penetration tester MOST likely use in order to establish a static ARP entry successfully?

A.
tcpdump -i eth01 arp and arp[6:2] == 2
A.
tcpdump -i eth01 arp and arp[6:2] == 2
Answers
B.
arp -s 192.168.1.63 60-36-DD-A6-C5-33
B.
arp -s 192.168.1.63 60-36-DD-A6-C5-33
Answers
C.
ipconfig /all findstr /v 00-00-00 | findstr Physical
C.
ipconfig /all findstr /v 00-00-00 | findstr Physical
Answers
D.
route add 192.168.1.63 mask 255.255.255.255.0 192.168.1.1
D.
route add 192.168.1.63 mask 255.255.255.255.0 192.168.1.1
Answers
Suggested answer: B

Explanation:

The arp command is used to manipulate or display the Address Resolution Protocol (ARP) cache, which is a table that maps IP addresses to physical addresses (MAC addresses) on a network. The -s option is used to add a static ARP entry to the cache, which means that it will not expire or be overwritten by dynamic ARP entries. The syntax for adding a static ARP entry is arp -s <IP address> <physical address>. Therefore, the command arp -s 192.168.1.63 60-36-DD-A6-C5-33 would add a static ARP entry for the IP address 192.168.1.63 and the physical address 60-36-DD-A6-C5-33 to the local cache of the attacker machine. This would allow the attacker machine to communicate with the target machine without relying on ARP requests or replies. The other commands are not valid or useful for establishing a static ARP entry.

During an internal penetration test against a company, a penetration tester was able to navigate to another part of the network and locate a folder containing customer information such as addresses, phone numbers, and credit card numbers. To be PCI compliant, which of the following should the company have implemented to BEST protect this data?

A.
Vulnerability scanning
A.
Vulnerability scanning
Answers
B.
Network segmentation
B.
Network segmentation
Answers
C.
System hardening
C.
System hardening
Answers
D.
Intrusion detection
D.
Intrusion detection
Answers
Suggested answer: B

Explanation:

Network segmentation is the practice of dividing a network into smaller subnetworks or segments based on different criteria, such as function, security level, or access control. Network segmentation can enhance the security of a network by isolating sensitive or critical systems from less secure or untrusted systems, reducing the attack surface, limiting the spread of malware or intrusions, and enforcing granular policies and rules for each segment. To be PCI compliant, which is a set of standards for protecting payment card data, the company should have implemented network segmentation to separate the servers that perform financial transactions from other parts of the network that may be less secure or more exposed to threats. The other options are not specific requirements for PCI compliance, although they may be good security practices in general.

A security analyst needs to perform a scan for SMB port 445 over a/16 network. Which of the following commands would be the BEST option when stealth is not a concern and the task is time sensitive?

A.
Nmap -s 445 -Pn -T5 172.21.0.0/16
A.
Nmap -s 445 -Pn -T5 172.21.0.0/16
Answers
B.
Nmap -p 445 -n -T4 -open 172.21.0.0/16
B.
Nmap -p 445 -n -T4 -open 172.21.0.0/16
Answers
C.
Nmap -sV --script=smb* 172.21.0.0/16
C.
Nmap -sV --script=smb* 172.21.0.0/16
Answers
D.
Nmap -p 445 -max -sT 172. 21.0.0/16
D.
Nmap -p 445 -max -sT 172. 21.0.0/16
Answers
Suggested answer: B

Explanation:

Nmap is a tool that can perform network scanning and enumeration by sending packets to hosts and analyzing their responses. The command Nmap -p 445 -n -T4 -open 172.21.0.0/16 would scan for SMB port 445 over a /16 network with the following options:

-p 445 specifies the port number to scan.

-n disables DNS resolution, which can speed up the scan by avoiding unnecessary queries.

-T4 sets the timing template to aggressive, which increases the speed of the scan by sending packets faster and waiting less for responses.

-open only shows hosts that have open ports, which can reduce the output and focus on relevant results. The other commands are not optimal for scanning SMB port 445 over a /16 network when stealth is not a concern and the task is time sensitive.

Total 422 questions
Go to page: of 43