ExamGecko
Home Home / CompTIA / PT0-002

CompTIA PT0-002 Practice Test - Questions Answers, Page 42

Question list
Search
Search

List of questions

Search

Related questions











During an engagement, a junior penetration tester found a multihomed host that led to an unknown network segment. The penetration tester ran a port scan against the network segment, which caused an outage at the customer's factory. Which of the following documents should the junior penetration tester most likely follow to avoid this issue in the future?

A.
NDA
A.
NDA
Answers
B.
MSA
B.
MSA
Answers
C.
ROE
C.
ROE
Answers
D.
SLA
D.
SLA
Answers
Suggested answer: C

Explanation:

* Rules of Engagement (ROE) documents outline the scope, boundaries, and rules for a penetration test to prevent unintended consequences such as network outages.

* Details:

NDA (Non-Disclosure Agreement): Protects confidential information but does not provide guidelines for engagement.

MSA (Master Service Agreement): General terms and conditions for services but does not detail specific engagement rules.

ROE (Rules of Engagement): Specifies the limits and guidelines for testing, including which systems can be tested, when, and how, to avoid disruptions.

SLA (Service Level Agreement): Defines the level of service expected but does not guide the testing process.

*

Reference: ROE is a critical document in penetration testing engagements to ensure both the tester and client are aligned on the scope and limitations, as outlined in various penetration testing standards and methodologies.

A penetration tester is performing an assessment for an organization and must gather valid user credentials. Which of the following attacks would be best for the tester to use to achieve this objective?

A.
Wardriving
A.
Wardriving
Answers
B.
Captive portal
B.
Captive portal
Answers
C.
Deauthentication
C.
Deauthentication
Answers
D.
Impersonation
D.
Impersonation
Answers
Suggested answer: C

Explanation:

* Deauthentication attacks can force legitimate users to disconnect from a wireless network, prompting them to reconnect and, in the process, capture valid user credentials using a rogue access point or network monitoring tools.

* Details:

A . Wardriving: Involves driving around to discover wireless networks; it does not directly gather user credentials.

B . Captive portal: Requires users to log in but is not an attack method; it is a legitimate method to control network access.

C . Deauthentication: Forces users to reauthenticate, allowing an attacker to capture credentials during the reconnection process.

D . Impersonation: Involves pretending to be someone else to gain access but is less effective for directly capturing user credentials compared to deauthentication.

*

Reference: Deauthentication attacks are well-documented in wireless security assessments and penetration testing guides.

After successfully compromising a remote host, a security consultant notices an endpoint protection software is running on the host. Which of the following commands would be best for the consultant to use to terminate the protection software and its child processes?

A.
taskkill /PID <PID> /T /F
A.
taskkill /PID <PID> /T /F
Answers
B.
taskkill /PID <PID> /IM /F
B.
taskkill /PID <PID> /IM /F
Answers
C.
taskkill /PID <PID> /S /U
C.
taskkill /PID <PID> /S /U
Answers
D.
taskkill /PID <PID> /F /P
D.
taskkill /PID <PID> /F /P
Answers
Suggested answer: A

Explanation:

The taskkill command is used in Windows to terminate tasks by process ID (PID) or image name (IM). The correct command to terminate a specified process and any child processes which were started by it uses the /T flag, and the /F flag is used to force terminate the process. Therefore, taskkill /PID <PID> /T /F is the correct syntax to terminate the endpoint protection software and its child processes.

The other options listed are either incorrect syntax or do not accomplish the task of terminating the child processes:

* /IM specifies the image name but is not necessary when using /PID.

* /S specifies the remote system to connect to and /U specifies the user context under which the command should execute, neither of which are relevant to terminating processes.

* There is no /P flag in the taskkill command.

A penetration tester is performing an assessment of an application that allows users to upload documents to a cloud-based file server for easy access anywhere in the world. Which of the following would most likely allow a tester to access unintentionally exposed documents?

A.
Directory traversal attack
A.
Directory traversal attack
Answers
B.
Cross-site request forgery
B.
Cross-site request forgery
Answers
C.
Cross-site scripting attack
C.
Cross-site scripting attack
Answers
D.
Session attack
D.
Session attack
Answers
Suggested answer: A

Explanation:

A directory traversal attack, also known as a path traversal attack, is a method used to exploit insufficient security validation or sanitization of user-supplied input file names. The goal of this attack is to access directories and files that are stored outside the web root folder. By manipulating variables that reference files with ''../'' sequences and its variations, attackers can access restricted directories and execute commands outside of the web server's root directory.

In the context of an application that allows users to upload documents to a cloud-based file server, an attacker might exploit a directory traversal vulnerability to navigate to directories that contain sensitive documents. If the file upload functionality is not properly secured, an attacker could upload a file with a payload designed to perform directory traversal. This could allow access to confidential files that are otherwise protected by the application's access control mechanisms.

OWASP Directory Traversal Cheat Sheet: OWASP Directory Traversal

Practical example from HTB Writeups like Forge and Anubis which demonstrate similar enumeration techniques leading to sensitive file disclosures.

Which of the following is the most important to include in the scope of a wireless security assessment?

A.
Frequencies
A.
Frequencies
Answers
B.
APs
B.
APs
Answers
C.
SSIDs
C.
SSIDs
Answers
D.
Signal strengths
D.
Signal strengths
Answers
Suggested answer: B

Explanation:

* Access Points (APs) are crucial in a wireless security assessment as they are the main points through which devices connect to the network. Identifying and securing APs ensures network integrity and security.

* Details:

A . Frequencies: Important but not as critical as identifying and assessing APs.

B . APs: Central to the network's security; assessing AP configurations, placements, and security settings is essential.

C . SSIDs: Identifying SSIDs is part of the assessment but does not provide a complete picture without evaluating APs.

D . Signal strengths: Useful for understanding coverage but secondary to assessing AP security.

*

Reference: Wireless security assessments prioritize AP evaluation as they are the entry points to the network, as outlined in various wireless security frameworks and methodologies.

* System hardening involves securing a system by reducing its surface of vulnerability, which includes changing default credentials, disabling unnecessary services, and applying security patches.

* Details:

A . Password encryption: Secures passwords but does not address the issue of default credentials.

B . System hardening: Comprehensive approach to securing the system, including changing default credentials.

C . Multifactor authentication: Adds an additional layer of security but does not solve the problem of default credentials being enabled.

D . Patch management: Ensures software is up-to-date but does not directly address default credentials.

*

Reference: System hardening is a fundamental practice in securing systems and preventing unauthorized access, as detailed in security best practices and guidelines.

As part of active reconnaissance, penetration testers need to determine whether a protection mechanism is in place to safeguard the target's website against web application attacks. Which of the following methods would be the most suitable?

A.
Direct-to-origin testing
A.
Direct-to-origin testing
Answers
B.
Antivirus scanning
B.
Antivirus scanning
Answers
C.
Scapy packet crafting
C.
Scapy packet crafting
Answers
D.
WAF detection
D.
WAF detection
Answers
Suggested answer: D

Explanation:

* Detecting a Web Application Firewall (WAF) helps penetration testers understand the protective measures in place and tailor their testing methods to bypass these defenses.

* Details:

A . Direct-to-origin testing: Useful for bypassing CDN but not specifically for detecting protective mechanisms like WAF.

B . Antivirus scanning: Not relevant for web application attacks.

C . Scapy packet crafting: Useful for network-level testing but not for detecting web application protections.

D . WAF detection: Identifies if a WAF is present, which is critical for understanding and bypassing web application defenses.

*

Reference: WAF detection techniques are documented in web application security testing methodologies such as OWASP.

During an assessment, a penetration tester found an application with the default credentials enabled. Which of the following best describes the technical control required to fix this issue?

A.
Password encryption
A.
Password encryption
Answers
B.
System hardening
B.
System hardening
Answers
C.
Multifactor authentication
C.
Multifactor authentication
Answers
D.
Patchmanagement
D.
Patchmanagement
Answers
Suggested answer: B

Explanation:

* System hardening involves securing a system by reducing its surface of vulnerability, which includes changing default credentials, disabling unnecessary services, and applying security patches.

* Details:

A . Password encryption: Secures passwords but does not address the issue of default credentials.

B . System hardening: Comprehensive approach to securing the system, including changing default credentials.

C . Multifactor authentication: Adds an additional layer of security but does not solve the problem of default credentials being enabled.

D . Patch management: Ensures software is up-to-date but does not directly address default credentials.

*

Reference: System hardening is a fundamental practice in securing systems and preventing unauthorized access, as detailed in security best practices and guidelines.

End Practice TestAre you sure you want to end the test?YesNo


A penetration tester was able to gain access to a plaintext file on a user workstation. Upon opening the file, the tester notices some strings of randomly generated text. The tester is able to use these strings to move laterally throughout the network by accessing the fileshare on a web application. Which of the following should the organization do to remediate the issue?

A.
Sanitize user input.
A.
Sanitize user input.
Answers
B.
Implement password management solution.
B.
Implement password management solution.
Answers
C.
Rotate keys.
C.
Rotate keys.
Answers
D.
Utilize certificate management.
D.
Utilize certificate management.
Answers
Suggested answer: B

Explanation:

The presence of plaintext strings that can be used to move laterally across the network suggests that passwords or sensitive tokens are stored insecurely. Implementing a password management solution would help mitigate this issue by ensuring that passwords are stored securely and are not exposed in plaintext. Password managers typically use strong encryption to protect stored credentials and provide secure access to them.

Sanitizing user input, rotating keys, and utilizing certificate management address different aspects of security but do not directly resolve the issue of insecure password storage.

Importance of password management: NIST Password Guidelines

Examples of security breaches due to poor password management practices: Forge.

A penetration tester is hired to test a client's systems. The client's systems are hosted by the client at its headquarters. The production environment is hosted by a private cloud-hosting company. Which of the following would be the most important for the penetration tester to determine before beginning the test?

A.
Third-party asset restrictions
A.
Third-party asset restrictions
Answers
B.
Disallowed tests
B.
Disallowed tests
Answers
C.
Physical locations of the infrastructure
C.
Physical locations of the infrastructure
Answers
D.
Time-of-day restrictions
D.
Time-of-day restrictions
Answers
Suggested answer: A

Explanation:

Before beginning a penetration test, it is crucial to determine any restrictions related to third-party assets. This is particularly important when the client's systems are hosted by a third-party cloud provider. The penetration tester needs to know what limitations or restrictions are imposed by the third-party hosting company to avoid violating terms of service, causing unintended disruptions, or legal issues.

Understanding third-party asset restrictions ensures that the testing activities comply with legal and contractual obligations and avoid potential conflicts with the third-party provider.

Penetration testing considerations: OWASP Testing Guide

Experiences from various penetration testing engagements highlighting the importance of third-party restrictions: Anubis.

Which of the following is a ROE component that provides a penetration tester with guidance on who and how to contact the necessary individuals in the event of a disaster during an engagement?

A.
Engagement scope
A.
Engagement scope
Answers
B.
Communication escalation path
B.
Communication escalation path
Answers
C.
SLA
C.
SLA
Answers
D.
SOW
D.
SOW
Answers
Suggested answer: B

Explanation:

The communication escalation path is a component of the Rules of Engagement (ROE) that provides a penetration tester with guidance on whom to contact and how to proceed in the event of an emergency or disaster during an engagement. This includes contact information for key individuals and predefined procedures to follow to ensure that any issues are addressed promptly and appropriately.

The engagement scope defines the boundaries and objectives of the test, the SLA (Service Level Agreement) outlines performance and uptime requirements, and the SOW (Statement of Work) details the tasks and deliverables. However, the communication escalation path specifically addresses communication protocols during emergencies.

Explanation of Rules of Engagement components: OWASP Testing Guide

Examples from penetration testing engagements highlighting the importance of communication plans: Anubis.

Total 422 questions
Go to page: of 43