ExamGecko
Home Home / CompTIA / PT0-002

CompTIA PT0-002 Practice Test - Questions Answers, Page 6

Question list
Search
Search

List of questions

Search

Related questions











A penetration tester is testing input validation on a search form that was discovered on a website.

Which of the following characters is the BEST option to test the website for vulnerabilities?

A.
Comma
A.
Comma
Answers
B.
Double dash
B.
Double dash
Answers
C.
Single quote
C.
Single quote
Answers
D.
Semicolon
D.
Semicolon
Answers
Suggested answer: C

Explanation:

A single quote (') is a common character used to test for SQL injection vulnerabilities, which occur when user input is directly passed to a database query. A single quote can terminate a string literal and allow an attacker to inject malicious SQL commands. For example, if the search form uses the query SELECT * FROM products WHERE name LIKE '%user_input%', then entering a single quote as user input would result in an error or unexpected behavior

A penetration tester was conducting a penetration test and discovered the network traffic was no longer reaching the client's IP address. The tester later discovered the SOC had used sinkholing on the penetration tester's IP address. Which of the following BEST describes what happened?

A.
The penetration tester was testing the wrong assets
A.
The penetration tester was testing the wrong assets
Answers
B.
The planning process failed to ensure all teams were notified
B.
The planning process failed to ensure all teams were notified
Answers
C.
The client was not ready for the assessment to start
C.
The client was not ready for the assessment to start
Answers
D.
The penetration tester had incorrect contact information
D.
The penetration tester had incorrect contact information
Answers
Suggested answer: B

Explanation:

Sinkholing is a technique used by security teams to redirect malicious or unwanted network traffic to a controlled destination, such as a black hole or a honeypot. This can help prevent or mitigate attacks, analyze malware behavior, or isolate infected hosts. If the SOC used sinkholing on the penetration tester's IP address, it means that they detected the tester's activity and blocked it from reaching the client's network. This indicates that the planning process failed to ensure all teams were notified about the penetration testing engagement, which could have avoided this situation.

A penetration tester wants to perform reconnaissance without being detected. Which of the following activities have a MINIMAL chance of detection? (Choose two.)

A.
Open-source research
A.
Open-source research
Answers
B.
A ping sweep
B.
A ping sweep
Answers
C.
Traffic sniffing
C.
Traffic sniffing
Answers
D.
Port knocking
D.
Port knocking
Answers
E.
A vulnerability scan
E.
A vulnerability scan
Answers
F.
An Nmap scan
F.
An Nmap scan
Answers
Suggested answer: A, C

Explanation:

Open-source research and traffic sniffing are two activities that have a minimal chance of detection, as they do not involve sending any packets or requests to the target network or system. Open-source research is the process of gathering information from publicly available sources, such as websites, social media, blogs, forums, etc. Traffic sniffing is the process of capturing and analyzing network packets that are transmitted over a shared medium, such as wireless or Ethernet.

Reference: https://www.sciencedirect.com/topics/computer-science/passive-reconnaissance

A penetration tester obtained the following results after scanning a web server using the dirb utility:

...

GENERATED WORDS: 4612

---- Scanning URL: http://10.2.10.13/ ----

+ http://10.2.10.13/about (CODE:200|SIZE:1520)

+ http://10.2.10.13/home.html (CODE:200|SIZE:214)

+ http://10.2.10.13/index.html (CODE:200|SIZE:214)

+ http://10.2.10.13/info (CODE:200|SIZE:214)

...

DOWNLOADED: 4612 - FOUND: 4 Which of the following elements is MOST likely to contain useful information for the penetration tester?

A.
index.html
A.
index.html
Answers
B.
about
B.
about
Answers
C.
info
C.
info
Answers
D.
home.html
D.
home.html
Answers
Suggested answer: B

Explanation:

The element /about is most likely to contain useful information for the penetration tester, as it may reveal details about the website's owner, purpose, history, contact information, etc. This information can be used for further reconnaissance, social engineering, or identifying potential vulnerabilities.

A penetration tester has obtained root access to a Linux-based file server and would like to maintain persistence after reboot. Which of the following techniques would BEST support this objective?

A.
Create a one-shot system service to establish a reverse shell.
A.
Create a one-shot system service to establish a reverse shell.
Answers
B.
Obtain /etc/shadow and brute force the root password.
B.
Obtain /etc/shadow and brute force the root password.
Answers
C.
Run the nc -e /bin/sh <...> command.
C.
Run the nc -e /bin/sh <...> command.
Answers
D.
Move laterally to create a user account on LDAP
D.
Move laterally to create a user account on LDAP
Answers
Suggested answer: A

Explanation:

https://hosakacorp.net/p/systemd-user.html

Creating a one-shot system service to establish a reverse shell is a technique that would best support maintaining persistence after reboot on a Linux-based file server. A system service is a program that runs in the background and performs various tasks without user interaction. A one-shot system service is a type of service that runs only once and then exits. A reverse shell is a type of shell that connects back to an attacker-controlled machine and allows remote command execution. By creating a one-shot system service that runs a reverse shell script at boot time, the penetration tester can ensure persistent access to the file server even after reboot.

A penetration tester has identified several newly released CVEs on a VoIP call manager. The scanning tool the tester used determined the possible presence of the CVEs based off the version number of the service. Which of the following methods would BEST support validation of the possible findings?

A.
Manually check the version number of the VoIP service against the CVE release
A.
Manually check the version number of the VoIP service against the CVE release
Answers
B.
Test with proof-of-concept code from an exploit database
B.
Test with proof-of-concept code from an exploit database
Answers
C.
Review SIP traffic from an on-path position to look for indicators of compromise
C.
Review SIP traffic from an on-path position to look for indicators of compromise
Answers
D.
Utilize an nmap -sV scan against the service
D.
Utilize an nmap -sV scan against the service
Answers
Suggested answer: B

Explanation:

Testing with proof-of-concept code from an exploit database is the best method to support validation of the possible findings, as it will demonstrate whether the CVEs are actually exploitable on the target VoIP call manager. Proof-of-concept code is a piece of software or script that shows how an attacker can exploit a vulnerability in a system or application. An exploit database is a repository of publicly available exploits, such as Exploit Database or Metasploit.

Reference: https://dokumen.pub/hacking-exposed-unified-communications-amp-voip-securitysecrets-amp- solutions-2nd-edition-9780071798778-0071798773-9780071798761-0071798765.html

A penetration tester is scanning a corporate lab network for potentially vulnerable services. Which of the following Nmap commands will return vulnerable ports that might be interesting to a potential attacker?

A.
nmap 192.168.1.1-5 -PU22-25,80
A.
nmap 192.168.1.1-5 -PU22-25,80
Answers
B.
nmap 192.168.1.1-5 -PA22-25,80
B.
nmap 192.168.1.1-5 -PA22-25,80
Answers
C.
nmap 192.168.1.1-5 -PS22-25,80
C.
nmap 192.168.1.1-5 -PS22-25,80
Answers
D.
nmap 192.168.1.1-5 -Ss22-25,80
D.
nmap 192.168.1.1-5 -Ss22-25,80
Answers
Suggested answer: C

Explanation:

PS/PA/PU/PY are host discovery flags which use TCP SYN/ACK, UDP or SCTP discovery respectively.

And since the ports in the options are mostly used by TCP protocols, then it's either the PS or PA flag.

But since we need to know if the ports are live, sending SYN packet is a better alternative. Hence, I choose PS in this case.

The nmap -PS22-25,80 192.168.1.1-5 command will return vulnerable ports that might be interesting to a potential attacker, as it will perform a TCP SYN scan on ports 22, 23, 24, 25, and 80 of the target hosts. A TCP SYN scan is a stealthy technique that sends a SYN packet to each port and waits for a response. If the response is a SYN/ACK packet, it means the port is open and listening for connections. If the response is a RST packet, it means the port is closed and not accepting connections. If there is no response, it means the port is filtered by a firewall or IDS1.

A software development team is concerned that a new product's 64-bit Windows binaries can be deconstructed to the underlying code. Which of the following tools can a penetration tester utilize to help the team gauge what an attacker might see in the binaries?

A.
Immunity Debugger
A.
Immunity Debugger
Answers
B.
OllyDbg
B.
OllyDbg
Answers
C.
GDB
C.
GDB
Answers
D.
Drozer
D.
Drozer
Answers
Suggested answer: A

Explanation:

Immunity Debugger is a tool that can be used to deconstruct 64-bit Windows binaries and see the underlying code. Immunity Debugger is a powerful debugger that integrates with Python and allows users to write their own scripts and plugins. It can be used for reverse engineering, malware analysis, vulnerability research, and exploit development

A mail service company has hired a penetration tester to conduct an enumeration of all user accounts on an SMTP server to identify whether previous staff member accounts are still active.

Which of the following commands should be used to accomplish the goal?

A.
VRFY and EXPN
A.
VRFY and EXPN
Answers
B.
VRFY and TURN
B.
VRFY and TURN
Answers
C.
EXPN and TURN
C.
EXPN and TURN
Answers
D.
RCPT TO and VRFY
D.
RCPT TO and VRFY
Answers
Suggested answer: A

Explanation:

The VRFY and EXPN commands can be used to enumerate user accounts on an SMTP server, as they are used to verify the existence of users or mailing lists. VRFY (verify) asks the server to confirm that a given user name or address is valid. EXPN (expand) asks the server to expand a mailing list into its individual members. These commands can be used by a penetration tester to identify valid user names or e-mail addresses on the target SMTP server.

Reference: https://hackerone.com/reports/193314

Which of the following tools provides Python classes for interacting with network protocols?

A.
Responder
A.
Responder
Answers
B.
Impacket
B.
Impacket
Answers
C.
Empire
C.
Empire
Answers
D.
PowerSploit
D.
PowerSploit
Answers
Suggested answer: B

Explanation:

Impacket is a tool that provides Python classes for interacting with network protocols, such as SMB, DCE/RPC, LDAP, Kerberos, etc. Impacket can be used for network analysis, packet manipulation, authentication spoofing, credential dumping, lateral movement, and remote execution.

Reference: https://github.com/SecureAuthCorp/impacket

Total 422 questions
Go to page: of 43