ExamGecko
Home / CompTIA / PT0-002 / List of questions
Ask Question

CompTIA PT0-002 Practice Test - Questions Answers, Page 6

Add to Whishlist

List of questions

Question 51

Report Export Collapse

A penetration tester is testing input validation on a search form that was discovered on a website.

Which of the following characters is the BEST option to test the website for vulnerabilities?

Comma
Comma
Double dash
Double dash
Single quote
Single quote
Semicolon
Semicolon
Suggested answer: C
Explanation:

A single quote (') is a common character used to test for SQL injection vulnerabilities, which occur when user input is directly passed to a database query. A single quote can terminate a string literal and allow an attacker to inject malicious SQL commands. For example, if the search form uses the query SELECT * FROM products WHERE name LIKE '%user_input%', then entering a single quote as user input would result in an error or unexpected behavior

asked 02/10/2024
carlos salgado
45 questions

Question 52

Report Export Collapse

A penetration tester was conducting a penetration test and discovered the network traffic was no longer reaching the client's IP address. The tester later discovered the SOC had used sinkholing on the penetration tester's IP address. Which of the following BEST describes what happened?

The penetration tester was testing the wrong assets
The penetration tester was testing the wrong assets
The planning process failed to ensure all teams were notified
The planning process failed to ensure all teams were notified
The client was not ready for the assessment to start
The client was not ready for the assessment to start
The penetration tester had incorrect contact information
The penetration tester had incorrect contact information
Suggested answer: B
Explanation:

Sinkholing is a technique used by security teams to redirect malicious or unwanted network traffic to a controlled destination, such as a black hole or a honeypot. This can help prevent or mitigate attacks, analyze malware behavior, or isolate infected hosts. If the SOC used sinkholing on the penetration tester's IP address, it means that they detected the tester's activity and blocked it from reaching the client's network. This indicates that the planning process failed to ensure all teams were notified about the penetration testing engagement, which could have avoided this situation.

asked 02/10/2024
Tanner Blair
39 questions

Question 53

Report Export Collapse

A penetration tester wants to perform reconnaissance without being detected. Which of the following activities have a MINIMAL chance of detection? (Choose two.)

Open-source research
Open-source research
A ping sweep
A ping sweep
Traffic sniffing
Traffic sniffing
Port knocking
Port knocking
A vulnerability scan
A vulnerability scan
An Nmap scan
An Nmap scan
Suggested answer: A, C
Explanation:

Open-source research and traffic sniffing are two activities that have a minimal chance of detection, as they do not involve sending any packets or requests to the target network or system. Open-source research is the process of gathering information from publicly available sources, such as websites, social media, blogs, forums, etc. Traffic sniffing is the process of capturing and analyzing network packets that are transmitted over a shared medium, such as wireless or Ethernet.

Reference: https://www.sciencedirect.com/topics/computer-science/passive-reconnaissance

asked 02/10/2024
Maria Telan
36 questions

Question 54

Report Export Collapse

A penetration tester obtained the following results after scanning a web server using the dirb utility:

...

GENERATED WORDS: 4612

---- Scanning URL: http://10.2.10.13/ ----

+ http://10.2.10.13/about (CODE:200|SIZE:1520)

+ http://10.2.10.13/home.html (CODE:200|SIZE:214)

+ http://10.2.10.13/index.html (CODE:200|SIZE:214)

+ http://10.2.10.13/info (CODE:200|SIZE:214)

...

DOWNLOADED: 4612 - FOUND: 4 Which of the following elements is MOST likely to contain useful information for the penetration tester?

index.html
index.html
about
about
info
info
home.html
home.html
Suggested answer: B
Explanation:

The element /about is most likely to contain useful information for the penetration tester, as it may reveal details about the website's owner, purpose, history, contact information, etc. This information can be used for further reconnaissance, social engineering, or identifying potential vulnerabilities.

asked 02/10/2024
Tr Skumar
59 questions

Question 55

Report Export Collapse

A penetration tester has obtained root access to a Linux-based file server and would like to maintain persistence after reboot. Which of the following techniques would BEST support this objective?

Create a one-shot system service to establish a reverse shell.
Create a one-shot system service to establish a reverse shell.
Obtain /etc/shadow and brute force the root password.
Obtain /etc/shadow and brute force the root password.
Run the nc -e /bin/sh <...> command.
Run the nc -e /bin/sh <...> command.
Move laterally to create a user account on LDAP
Move laterally to create a user account on LDAP
Suggested answer: A
Explanation:

https://hosakacorp.net/p/systemd-user.html

Creating a one-shot system service to establish a reverse shell is a technique that would best support maintaining persistence after reboot on a Linux-based file server. A system service is a program that runs in the background and performs various tasks without user interaction. A one-shot system service is a type of service that runs only once and then exits. A reverse shell is a type of shell that connects back to an attacker-controlled machine and allows remote command execution. By creating a one-shot system service that runs a reverse shell script at boot time, the penetration tester can ensure persistent access to the file server even after reboot.

asked 02/10/2024
Naveen Kotipalli
42 questions

Question 56

Report Export Collapse

A penetration tester has identified several newly released CVEs on a VoIP call manager. The scanning tool the tester used determined the possible presence of the CVEs based off the version number of the service. Which of the following methods would BEST support validation of the possible findings?

Manually check the version number of the VoIP service against the CVE release
Manually check the version number of the VoIP service against the CVE release
Test with proof-of-concept code from an exploit database
Test with proof-of-concept code from an exploit database
Review SIP traffic from an on-path position to look for indicators of compromise
Review SIP traffic from an on-path position to look for indicators of compromise
Utilize an nmap -sV scan against the service
Utilize an nmap -sV scan against the service
Suggested answer: B
Explanation:

Testing with proof-of-concept code from an exploit database is the best method to support validation of the possible findings, as it will demonstrate whether the CVEs are actually exploitable on the target VoIP call manager. Proof-of-concept code is a piece of software or script that shows how an attacker can exploit a vulnerability in a system or application. An exploit database is a repository of publicly available exploits, such as Exploit Database or Metasploit.

Reference: https://dokumen.pub/hacking-exposed-unified-communications-amp-voip-securitysecrets-amp- solutions-2nd-edition-9780071798778-0071798773-9780071798761-0071798765.html

asked 02/10/2024
Reselan Govender
43 questions

Question 57

Report Export Collapse

A penetration tester is scanning a corporate lab network for potentially vulnerable services. Which of the following Nmap commands will return vulnerable ports that might be interesting to a potential attacker?

nmap 192.168.1.1-5 -PU22-25,80
nmap 192.168.1.1-5 -PU22-25,80
nmap 192.168.1.1-5 -PA22-25,80
nmap 192.168.1.1-5 -PA22-25,80
nmap 192.168.1.1-5 -PS22-25,80
nmap 192.168.1.1-5 -PS22-25,80
nmap 192.168.1.1-5 -Ss22-25,80
nmap 192.168.1.1-5 -Ss22-25,80
Suggested answer: C
Explanation:

PS/PA/PU/PY are host discovery flags which use TCP SYN/ACK, UDP or SCTP discovery respectively.

And since the ports in the options are mostly used by TCP protocols, then it's either the PS or PA flag.

But since we need to know if the ports are live, sending SYN packet is a better alternative. Hence, I choose PS in this case.

The nmap -PS22-25,80 192.168.1.1-5 command will return vulnerable ports that might be interesting to a potential attacker, as it will perform a TCP SYN scan on ports 22, 23, 24, 25, and 80 of the target hosts. A TCP SYN scan is a stealthy technique that sends a SYN packet to each port and waits for a response. If the response is a SYN/ACK packet, it means the port is open and listening for connections. If the response is a RST packet, it means the port is closed and not accepting connections. If there is no response, it means the port is filtered by a firewall or IDS1.

asked 02/10/2024
Michael Thornton
48 questions

Question 58

Report Export Collapse

A software development team is concerned that a new product's 64-bit Windows binaries can be deconstructed to the underlying code. Which of the following tools can a penetration tester utilize to help the team gauge what an attacker might see in the binaries?

Immunity Debugger
Immunity Debugger
OllyDbg
OllyDbg
GDB
GDB
Drozer
Drozer
Suggested answer: A
Explanation:

Immunity Debugger is a tool that can be used to deconstruct 64-bit Windows binaries and see the underlying code. Immunity Debugger is a powerful debugger that integrates with Python and allows users to write their own scripts and plugins. It can be used for reverse engineering, malware analysis, vulnerability research, and exploit development

asked 02/10/2024
EMELINE LE QUENTREC
31 questions

Question 59

Report Export Collapse

A mail service company has hired a penetration tester to conduct an enumeration of all user accounts on an SMTP server to identify whether previous staff member accounts are still active.

Which of the following commands should be used to accomplish the goal?

VRFY and EXPN
VRFY and EXPN
VRFY and TURN
VRFY and TURN
EXPN and TURN
EXPN and TURN
RCPT TO and VRFY
RCPT TO and VRFY
Suggested answer: A
Explanation:

The VRFY and EXPN commands can be used to enumerate user accounts on an SMTP server, as they are used to verify the existence of users or mailing lists. VRFY (verify) asks the server to confirm that a given user name or address is valid. EXPN (expand) asks the server to expand a mailing list into its individual members. These commands can be used by a penetration tester to identify valid user names or e-mail addresses on the target SMTP server.

Reference: https://hackerone.com/reports/193314

asked 02/10/2024
piera d'addelfio
37 questions

Question 60

Report Export Collapse

Which of the following tools provides Python classes for interacting with network protocols?

Responder
Responder
Impacket
Impacket
Empire
Empire
PowerSploit
PowerSploit
Suggested answer: B
Explanation:

Impacket is a tool that provides Python classes for interacting with network protocols, such as SMB, DCE/RPC, LDAP, Kerberos, etc. Impacket can be used for network analysis, packet manipulation, authentication spoofing, credential dumping, lateral movement, and remote execution.

Reference: https://github.com/SecureAuthCorp/impacket

asked 02/10/2024
Joseph Lewis
55 questions
Total 464 questions
Go to page: of 47
Search

Related questions