ExamGecko
Home / CompTIA / PT0-002 / List of questions
Ask Question

CompTIA PT0-002 Practice Test - Questions Answers, Page 7

Add to Whishlist

List of questions

Question 61

Report Export Collapse

A penetration tester has obtained shell access to a Windows host and wants to run a specially crafted binary for later execution using the wmic.exe process call create function. Which of the following OS or filesystem mechanisms is MOST likely to support this objective?

Alternate data streams
Alternate data streams
PowerShell modules
PowerShell modules
MP4 steganography
MP4 steganography
PsExec
PsExec
Suggested answer: A
Explanation:

Alternate data streams (ADS) are a feature of the NTFS file system that allows storing additional data in a file without affecting its size, name, or functionality. ADS can be used to hide or embed data or executable code in a file, such as a specially crafted binary for later execution. ADS can be created or accessed using various tools or commands, such as the command prompt, PowerShell, or Sysinternals12. For example, the following command can create an ADS named secret.exe in a file named test.txt and run it using wmic.exe process call create function: type secret.exe > test.txt:secret.exe & wmic process call create "cmd.exe /c test.txt:secret.exe"

asked 02/10/2024
Jevgenij Γ…Β½arikov
44 questions

Question 62

Report Export Collapse

A penetration tester discovers during a recent test that an employee in the accounting department has been making changes to a payment system and redirecting money into a personal bank account.

The penetration test was immediately stopped. Which of the following would be the BEST recommendation to prevent this type of activity in the future?

Enforce mandatory employee vacations
Enforce mandatory employee vacations
Implement multifactor authentication
Implement multifactor authentication
Install video surveillance equipment in the office
Install video surveillance equipment in the office
Encrypt passwords for bank account information
Encrypt passwords for bank account information
Suggested answer: A
Explanation:

If the employee already works in the accounting department, MFA will not stop their actions because they'll already have access by virtue of their job.

Enforcing mandatory employee vacations is the best recommendation to prevent this type of activity in the future, as it will make it harder for an employee to conceal fraudulent transactions or unauthorized changes to a payment system. Mandatory employee vacations are a form of internal control that requires employees to take time off from work periodically and have their duties performed by someone else. This can help detect errors, irregularities, or frauds committed by employees who might otherwise have exclusive access or control over certain processes or systems.

asked 02/10/2024
Nour Algharbi
47 questions

Question 63

Report Export Collapse

A penetration tester wants to scan a target network without being detected by the client's IDS.

Which of the following scans is MOST likely to avoid detection?

nmap -p0 -T0 -sS 192.168.1.10
nmap -p0 -T0 -sS 192.168.1.10
nmap -sA -sV --host-timeout 60 192.168.1.10
nmap -sA -sV --host-timeout 60 192.168.1.10
nmap -f --badsum 192.168.1.10
nmap -f --badsum 192.168.1.10
nmap -A -n 192.168.1.10
nmap -A -n 192.168.1.10
Suggested answer: C
Explanation:

The nmap -f --badsum 192.168.1.10 command is most likely to avoid detection by the client's IDS, as it will use two techniques to evade IDS signatures or filters. The -f option will fragment the IP packets into smaller pieces that might bypass some IDS rules or firewalls. The --badsum option will use an invalid checksum in the TCP or UDP header that might cause some IDS systems to ignore the packets.

asked 02/10/2024
Hicham Kaoussi
34 questions

Question 64

Report Export Collapse

Which of the following should a penetration tester do NEXT after identifying that an application being tested has already been compromised with malware?

Analyze the malware to see what it does.
Analyze the malware to see what it does.
Collect the proper evidence and then remove the malware.
Collect the proper evidence and then remove the malware.
Do a root-cause analysis to find out how the malware got in.
Do a root-cause analysis to find out how the malware got in.
Remove the malware immediately.
Remove the malware immediately.
Stop the assessment and inform the emergency contact.
Stop the assessment and inform the emergency contact.
Suggested answer: E
Explanation:

Stopping the assessment and informing the emergency contact is the best thing to do next after identifying that an application being tested has already been compromised with malware. This is because continuing the assessment might interfere with an ongoing investigation or compromise evidence collection. The emergency contact is the person designated by the client who should be notified in case of any critical issues or incidents during the penetration testing engagement.

Reference: https://www.redteamsecure.com/blog/my-company-was-hacked-now-what

asked 02/10/2024
Maksim Alpatov
50 questions

Question 65

Report Export Collapse

A penetration tester runs the following command on a system:

find / -user root -perm -4000 -print 2>/dev/null

Which of the following is the tester trying to accomplish?

Set the SGID on all files in the / directory
Set the SGID on all files in the / directory
Find the /root directory on the system
Find the /root directory on the system
Find files with the SUID bit set
Find files with the SUID bit set
Find files that were created during exploitation and move them to /dev/null
Find files that were created during exploitation and move them to /dev/null
Suggested answer: C
Explanation:

the 2>/dev/null is output redirection, it simply sends all the error messages to infinity and beyond preventing any error messages to appear in the terminal session.

The tester is trying to find files with the SUID bit set on the system. The SUID (set user ID) bit is a special permission that allows a file to be executed with the privileges of the file owner, regardless of who runs it. This can be used to perform privileged operations or access restricted resources. A penetration tester can use the find command with the -user and -perm options to search for files owned by a specific user (such as root) and having a specific permission (such as 4000, which indicates the SUID bit is set).

asked 02/10/2024
Babak Sadeghpour
33 questions

Question 66

Report Export Collapse

A penetration tester finds a PHP script used by a web application in an unprotected internal source code repository. After reviewing the code, the tester identifies the following:

CompTIA PT0-002 image Question 66 97195 10022024175320000000

Which of the following tools will help the tester prepare an attack for this scenario?

Hydra and crunch
Hydra and crunch
Netcat and cURL
Netcat and cURL
Burp Suite and DIRB
Burp Suite and DIRB
Nmap and OWASP ZAP
Nmap and OWASP ZAP
Suggested answer: B
Explanation:

Netcat and cURL are tools that will help the tester prepare an attack for this scenario, as they can be used to establish a TCP connection, send payloads, and receive responses from the target web server.

Netcat is a versatile tool that can create TCP or UDP connections and transfer data between hosts.

cURL is a tool that can transfer data using various protocols, such as HTTP, FTP, SMTP, etc. The tester can use these tools to exploit the PHP script that executes shell commands with the value of the "item" variable.

asked 02/10/2024
Kenneth Joines
46 questions

Question 67

Report Export Collapse

Which of the following would MOST likely be included in the final report of a static applicationsecurity test that was written with a team of application developers as the intended audience?

Executive summary of the penetration-testing methods used
Executive summary of the penetration-testing methods used
Bill of materials including supplies, subcontracts, and costs incurred during assessment
Bill of materials including supplies, subcontracts, and costs incurred during assessment
Quantitative impact assessments given a successful software compromise
Quantitative impact assessments given a successful software compromise
Code context for instances of unsafe type-casting operations
Code context for instances of unsafe type-casting operations
Suggested answer: D
Explanation:

Code context for instances of unsafe type-casting operations would most likely be included in the final report of a static application-security test that was written with a team of application developers as the intended audience, as it would provide relevant and actionable information for the developers to fix the vulnerabilities. Type-casting is the process of converting one data type to another, such as an integer to a string. Unsafe type-casting can lead to errors, crashes, or security issues, such as buffer overflows or code injection.

asked 02/10/2024
mohamed mamdouh
46 questions

Question 68

Report Export Collapse

A penetration tester is looking for a vulnerability that enables attackers to open doors via a specialized TCP service that is used for a physical access control system. The service exists on more than 100 different hosts, so the tester would like to automate the assessment. Identification requires the penetration tester to:

Have a full TCP connection

Send a "hello" payload

Walt for a response

Send a string of characters longer than 16 bytes

Which of the following approaches would BEST support the objective?

Run nmap -Pn -sV -script vuln <IP address>.
Run nmap -Pn -sV -script vuln <IP address>.
Employ an OpenVAS simple scan against the TCP port of the host.
Employ an OpenVAS simple scan against the TCP port of the host.
Create a script in the Lua language and use it with NSE.
Create a script in the Lua language and use it with NSE.
Perform a credentialed scan with Nessus.
Perform a credentialed scan with Nessus.
Suggested answer: C
Explanation:

The Nmap Scripting Engine (NSE) is one of Nmap's most powerful and flexible features. It allows users to write (and share) simple scripts (using the Lua programming language ) to automate a wide variety of networking tasks. https://nmap.org Creating a script in the Lua language and using it with NSE would best support the objective of finding a vulnerability that enables attackers to open doors via a specialized TCP service that is used for a physical access control system. NSE (Nmap Scripting Engine) is a feature of Nmap that allows users to write and run scripts to automate tasks or perform advanced scans. Lua is a scripting language that NSE supports and can be used to create custom scripts for Nmap.

asked 02/10/2024
shvoal gerama
39 questions

Question 69

Report Export Collapse

A company is concerned that its cloud VM is vulnerable to a cyberattack and proprietary data may be stolen. A penetration tester determines a vulnerability does exist and exploits the vulnerability by adding a fake VM instance to the IaaS component of the client's VM. Which of the following cloud attacks did the penetration tester MOST likely implement?

Direct-to-origin
Direct-to-origin
Cross-site scripting
Cross-site scripting
Malware injection
Malware injection
Credential harvesting
Credential harvesting
Suggested answer: C
Explanation:

Malware injection is the most likely cloud attack that the penetration tester implemented, as it involves adding a fake VM instance to the IaaS component of the client's VM. Malware injection is a type of attack that exploits vulnerabilities in cloud services or applications to inject malicious code or data into them. The injected malware can then compromise or control the cloud resources or data.

asked 02/10/2024
long tran
39 questions

Question 70

Report Export Collapse

A penetration tester needs to perform a test on a finance system that is PCI DSS v3.2.1 compliant.

Which of the following is the MINIMUM frequency to complete the scan of the system?

Weekly
Weekly
Monthly
Monthly
Quarterly
Quarterly
Annually
Annually
Suggested answer: C
Explanation:

Quarterly is the minimum frequency to complete the scan of the system that is PCI DSS v3.2.1 compliant, according to Requirement 11.2.2 of the standard1. PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards that applies to any organization that processes, stores, or transmits credit card information. Requirement 11.2.2 states that organizations must perform internal vulnerability scans at least quarterly and after any significant change in the network.

https://www.pcicomplianceguide.org/faq/#25

PCI DSS requires quarterly vulnerability/penetration tests, not weekly.

asked 02/10/2024
Barbara Bailey
45 questions
Total 464 questions
Go to page: of 47
Search

Related questions