ExamGecko
Home Home / CompTIA / PT0-002

CompTIA PT0-002 Practice Test - Questions Answers, Page 38

Question list
Search
Search

List of questions

Search

Related questions











A potential reason for communicating with the client point of contact during a penetration test is to provide resolution if a testing component crashes a system or service and leaves them unavailable for both legitimate users and further testing. Which of the following best describes this concept?

A.
Retesting
A.
Retesting
Answers
B.
De-escalation
B.
De-escalation
Answers
C.
Remediation
C.
Remediation
Answers
D.
Collision detection
D.
Collision detection
Answers
Suggested answer: C

Explanation:

Communicating with the client point of contact during a penetration test, especially when a testing component crashes a system or service, is crucial for remediation. Remediation involves the process of correcting or mitigating vulnerabilities that have been identified during the test. In the context of a system or service becoming unavailable, it's essential to promptly address and resolve the issue to restore availability and ensure the continuity of legitimate business operations. This communication ensures that the client is aware of the incident and can work together with the penetration tester to implement corrective actions, thereby minimizing the impact on the business and further testing activities.

A penetration tester was hired to test Wi-Fi equipment. Which of the following tools should be used to gather information about the wireless network?

A.
Kismet
A.
Kismet
Answers
B.
Burp Suite
B.
Burp Suite
Answers
C.
BeEF
C.
BeEF
Answers
D.
WHOIS
D.
WHOIS
Answers
Suggested answer: A

Explanation:

Kismet is a well-known tool used in penetration testing for wireless network detection, packet sniffing, and intrusion detection. It is particularly useful for gathering information about Wi-Fi networks as it can detect hidden networks and capture network packets. This capability allows penetration testers to analyze the wireless environment, identify potential vulnerabilities, and assess the security posture of the Wi-Fi equipment being tested. Unlike the other tools listed, Kismet is specifically designed for wireless network analysis, making it the ideal choice for this task.

A penetration tester is looking for a particular type of service and obtains the output below:

I Target is synchronized with 127.127.38.0 (reference clock)

I Alternative Target Interfaces:

I 10.17.4.20

I Private Servers (0)

I Public Servers (0)

I Private Peers (0)

I Public Peers (0)

I Private Clients (2)

I 10.20.8.69 169.254.138.63

I Public Clients (597)

I 4.79.17.248 68.70.72.194 74.247.37.194 99.190.119.152

I 12.10.160.20 68.80.36.133 75.1.39.42 108.7.58.118

I 68.56.205.98

I 2001:1400:0:0:0:0:0:1 2001:16d8:ddOO:38:0:0:0:2

I 2002:db5a:bccd:l:21d:e0ff:feb7:b96f 2002:b6ef:81c4:0:0:1145:59c5:3682

I Other Associations (1)

|_ 127.0.0.1 seen 1949869 times, last tx was unicast v2 mode 7

Which of the following commands was executed by the tester?

A.
nmap -sU -pU:517 -Pn -n ---script=supermicro-ipmi-config <target>
A.
nmap -sU -pU:517 -Pn -n ---script=supermicro-ipmi-config <target>
Answers
B.
nmap -sU -pU:123 -Pn -n ---script=ntp-monlist <target>
B.
nmap -sU -pU:123 -Pn -n ---script=ntp-monlist <target>
Answers
C.
nmap -sU -pU:161 -Pn -n ---scriptvoldemort-info <target>
C.
nmap -sU -pU:161 -Pn -n ---scriptvoldemort-info <target>
Answers
D.
nmap -sU -pU:37 -Pn -n ---script=icap-info <target>
D.
nmap -sU -pU:37 -Pn -n ---script=icap-info <target>
Answers
Suggested answer: B

Explanation:

The output provided indicates the use of the NTP protocol (Network Time Protocol) for querying a target system. The reference to 'Public Clients' and the specific IP addresses listed, along with the mention of 'Other Associations' and the use of NTP version 2, points towards the execution of an NTP monlist request. The monlist feature in NTP servers can be used to obtain a list of the last 600 hosts that have interacted with the NTP server. The command nmap -sU -pU:123 -Pn -n ---script=ntp-monlist <target> specifically targets NTP servers on UDP port 123 to retrieve this information, making it the correct choice based on the output shown.

A penetration tester is working to enumerate the PLC devices on the 10.88.88.76/24 network. Which of the following commands should the tester use to achieve the objective in a way that minimizes the risk of affecting the PLCs?

A.
nmap ---script=s7-info -p 102 10.88.88.76/24 -T3
A.
nmap ---script=s7-info -p 102 10.88.88.76/24 -T3
Answers
B.
nmap ---script=wsdd-discover -p 3702 -sUlO.88.88.76/24
B.
nmap ---script=wsdd-discover -p 3702 -sUlO.88.88.76/24
Answers
C.
nmap --script=iax2-version -p 4569 -sU -V 10.88.88.76/24 -T2
C.
nmap --script=iax2-version -p 4569 -sU -V 10.88.88.76/24 -T2
Answers
D.
nmap --script=xll-access -p 6000-6009 10.88.88.76/24
D.
nmap --script=xll-access -p 6000-6009 10.88.88.76/24
Answers
Suggested answer: A

Explanation:

The nmap command with the ---script=s7-info is specifically designed to interact with Siemens S7 PLCs, which are common industrial control systems. The -p 102 specifies the port associated with Siemens S7 communications. The -T3 timing option is chosen to minimize the risk of impacting the PLCs by not being overly aggressive in the scan timing, which is important in operational technology environments where PLCs can be sensitive to high network traffic. The other options listed do not specifically target PLC devices or use appropriate timing to minimize risk.

A penetration testing firm performs an assessment every six months for the same customer. While performing network scanning for the latest assessment, the penetration tester observes that several of the target hosts appear to be residential connections associated with a major television and ISP in the are a. Which of the following is the most likely reason for the observation?

A.
The penetration tester misconfigured the network scanner.
A.
The penetration tester misconfigured the network scanner.
Answers
B.
The network scanning tooling is not functioning properly.
B.
The network scanning tooling is not functioning properly.
Answers
C.
The IP ranges changed ownership.
C.
The IP ranges changed ownership.
Answers
D.
The network scanning activity is being blocked by a firewall.
D.
The network scanning activity is being blocked by a firewall.
Answers
Suggested answer: C

Explanation:

When a penetration tester notices several target hosts appearing to be residential connections associated with a major television and ISP, it's likely that the IP ranges initially assigned to the target organization have changed ownership and are now allocated to the ISP for residential use. This can happen due to reallocation of IP addresses by regional internet registries. Misconfiguration of the scanner (option A), malfunctioning of scanning tools (option B), or firewall blocking (option D) would not typically result in the discovery of residential connections in place of expected organizational targets.

A penetration tester is performing an assessment for an application that is used by large organizations operating in the heavily regulated financial services industry. The penetration tester observes that the default Admin User account is enabled and appears to be used several times a day by unfamiliar IP addresses. Which of the following is the most appropriate way to remediate this issue?

A.
Increase password complexity.
A.
Increase password complexity.
Answers
B.
Implement system hardening.
B.
Implement system hardening.
Answers
C.
Restrict simultaneous user log-ins.
C.
Restrict simultaneous user log-ins.
Answers
D.
Require local network access.
D.
Require local network access.
Answers
Suggested answer: D

Explanation:

Requiring local network access for the default Admin User account is a targeted measure to prevent unauthorized access from unfamiliar IP addresses, particularly those originating from outside the organization's network. This approach ensures that only devices physically connected to or authenticated within the local network can attempt to use the Admin User account, significantly reducing the risk of external attacks. Increasing password complexity and restricting simultaneous log-ins are good practices but do not directly address the issue of access from unfamiliar IPs. System hardening is broader and not specifically focused on the Admin User account issue.

Which of the following elements of a penetration testing report aims to provide a normalized and standardized representation of discovered vulnerabilities and the overall threat they present to an affected system or network?

A.
Executive summary
A.
Executive summary
Answers
B.
Vulnerability severity rating
B.
Vulnerability severity rating
Answers
C.
Recommendations of mitigation
C.
Recommendations of mitigation
Answers
D.
Methodology
D.
Methodology
Answers
Suggested answer: B

Explanation:

The vulnerability severity rating element of a penetration testing report provides a normalized and standardized representation of discovered vulnerabilities and their threat levels. It typically involves assigning a numerical or categorical score (such as low, medium, high, critical) to each vulnerability based on factors like exploitability, impact, and the context in which the vulnerability exists. This helps in prioritizing the vulnerabilities for remediation and provides a clear understanding of the risk they pose to the system or network.

During a security assessment, a penetration tester decides to implement a simple TCP port scanner to check the open ports from 1000 to 2000. Which of the following Python scripts would achieve this task?

A.
for i in range(1000, 2001): s = socket(AF_INET, SOCK_STREAM) conn = s.connect_ex((host_IP, i)) if (conn == 0): print(fPort {i} OPEN') s.close ()
A.
for i in range(1000, 2001): s = socket(AF_INET, SOCK_STREAM) conn = s.connect_ex((host_IP, i)) if (conn == 0): print(fPort {i} OPEN') s.close ()
Answers
B.
for i in range(1001, 2000): s = socket(AF_INET, SOCK_STREAM) conn = s.connect---ex((host_IP, i)) if (conn == 0): print (f'Port {i} OPEN') s.close ()
B.
for i in range(1001, 2000): s = socket(AF_INET, SOCK_STREAM) conn = s.connect---ex((host_IP, i)) if (conn == 0): print (f'Port {i} OPEN') s.close ()
Answers
C.
for i in range(1000, 2001): s = socket(AF---INET, SOCK_DGRAM) conn = s.connect---ex((host_IP, i)) if (conn == 0): print(f'Port {i} OPEN') s.close ()
C.
for i in range(1000, 2001): s = socket(AF---INET, SOCK_DGRAM) conn = s.connect---ex((host_IP, i)) if (conn == 0): print(f'Port {i} OPEN') s.close ()
Answers
D.
for i in range (1000, 2000): s = socket(SOCK_STREAM, AF_INET) conn = s.connect---ex((host---IP, i)) if (conn == 0): print (f'Port {i} OPEN') s.close()
D.
for i in range (1000, 2000): s = socket(SOCK_STREAM, AF_INET) conn = s.connect---ex((host---IP, i)) if (conn == 0): print (f'Port {i} OPEN') s.close()
Answers
Suggested answer: A

Explanation:

The correct Python script for implementing a simple TCP port scanner that checks for open ports from 1000 to 2000 is option A. This script uses a for loop to iterate through the range of ports, creates a socket object for each port using the socket.AF_INET address family (indicating IPv4) and socket.SOCK_STREAM socket type (indicating TCP), and attempts to connect to each port. If the connection attempt (connect_ex) returns 0, it indicates the port is open, and the script prints a message stating that the port is open before closing the socket. The other options contain syntax errors, use incorrect socket types, or have incorrect ranges that do not fully cover the specified ports.

A penetration tester discovers passwords in a publicly available data breach during the reconnaissance phase of the penetration test. Which of the following is the best action for the tester to take?

A.
Add the passwords to an appendix in the penetration test report.
A.
Add the passwords to an appendix in the penetration test report.
Answers
B.
Do nothing. Using passwords from breached data is unethical.
B.
Do nothing. Using passwords from breached data is unethical.
Answers
C.
Contact the client and inform them of the breach.
C.
Contact the client and inform them of the breach.
Answers
D.
Use the passwords in a credential stuffing attack when the external penetration test begins.
D.
Use the passwords in a credential stuffing attack when the external penetration test begins.
Answers
Suggested answer: C

Explanation:

Upon discovering passwords in a publicly available data breach during the reconnaissance phase, the most ethical and constructive action for the penetration tester is to contact the client and inform them of the breach. This approach allows the client to take necessary actions to mitigate any potential risks, such as forcing password resets or enhancing their security measures. Adding the passwords to a report appendix (option A) without context or action could be seen as irresponsible, while doing nothing (option B) neglects the tester's duty to inform the client of potential threats. Using the passwords in a credential stuffing attack (option D) without explicit permission as part of an agreed testing scope would be unethical and potentially illegal.

A penetration tester is performing an assessment for an organization and must gather valid user credentials. Which of the following attacks would be best for the tester to use to achieve this objective?

A.
Wardriving
A.
Wardriving
Answers
B.
Captive portal
B.
Captive portal
Answers
C.
Deauthentication
C.
Deauthentication
Answers
D.
Impersonation
D.
Impersonation
Answers
Suggested answer: D

Explanation:

Impersonation attacks involve the penetration tester assuming the identity of a valid user to gain unauthorized access to systems or information. This method is particularly effective for gathering valid user credentials, as it can involve tactics such as phishing, social engineering, or exploiting weak authentication processes. The other options, such as Wardriving, Captive portal, and Deauthentication, are more focused on wireless network vulnerabilities and are less direct in obtaining user credentials.

Total 422 questions
Go to page: of 43