ExamGecko
Home Home / CompTIA / PT0-002

CompTIA PT0-002 Practice Test - Questions Answers, Page 8

Question list
Search
Search

List of questions

Search

Related questions











A company becomes concerned when the security alarms are triggered during a penetration test.

Which of the following should the company do NEXT?

A.
Halt the penetration test.
A.
Halt the penetration test.
Answers
B.
Contact law enforcement.
B.
Contact law enforcement.
Answers
C.
Deconflict with the penetration tester.
C.
Deconflict with the penetration tester.
Answers
D.
Assume the alert is from the penetration test.
D.
Assume the alert is from the penetration test.
Answers
Suggested answer: C

Explanation:

Deconflicting with the penetration tester is the best thing to do next after the security alarms are triggered during a penetration test, as it will help determine whether the alarm was caused by the tester's activity or by an actual threat. Deconflicting is the process of communicating and coordinating with other parties involved in a penetration testing engagement, such as security teams, network administrators, or emergency contacts, to avoid confusion or interference.

A penetration tester wants to identify CVEs that can be leveraged to gain execution on a Linux server that has an SSHD running. Which of the following would BEST support this task?

A.
Run nmap with the -o, -p22, and -sC options set against the target
A.
Run nmap with the -o, -p22, and -sC options set against the target
Answers
B.
Run nmap with the -sV and -p22 options set against the target
B.
Run nmap with the -sV and -p22 options set against the target
Answers
C.
Run nmap with the --script vulners option set against the target
C.
Run nmap with the --script vulners option set against the target
Answers
D.
Run nmap with the -sA option set against the target
D.
Run nmap with the -sA option set against the target
Answers
Suggested answer: C

Explanation:

Running nmap with the --script vulners option set against the target would best support the task of identifying CVEs that can be leveraged to gain execution on a Linux server that has an SSHD running, as it will use an NSE script that checks for vulnerabilities based on version information from various sources, such as CVE databases2. The --script option allows users to specify which NSE scripts to run during an Nmap scan.

A penetration tester logs in as a user in the cloud environment of a company. Which of the following Pacu modules will enable the tester to determine the level of access of the existing user?

A.
iam_enum_permissions
A.
iam_enum_permissions
Answers
B.
iam_privesc_scan
B.
iam_privesc_scan
Answers
C.
iam_backdoor_assume_role
C.
iam_backdoor_assume_role
Answers
D.
iam_bruteforce_permissions
D.
iam_bruteforce_permissions
Answers
Suggested answer: A

Explanation:

The iam_enum_permissions module will enable the tester to determine the level of access of the existing user in the cloud environment of a company, as it will list all permissions associated with an IAM user3. IAM (Identity and Access Management) is a service that enables users to manage access and permissions for AWS resources. Pacu is a tool that can be used to perform penetration testing on AWS environments4.

Reference: https://essay.utwente.nl/76955/1/Szabo_MSc_EEMCS.pdf (37)

A penetration tester has completed an analysis of the various software products produced by the company under assessment. The tester found that over the past several years the company has been including vulnerable third-party modules in multiple products, even though the quality of the organic code being developed is very good. Which of the following recommendations should the penetration tester include in the report?

A.
Add a dependency checker into the tool chain.
A.
Add a dependency checker into the tool chain.
Answers
B.
Perform routine static and dynamic analysis of committed code.
B.
Perform routine static and dynamic analysis of committed code.
Answers
C.
Validate API security settings before deployment.
C.
Validate API security settings before deployment.
Answers
D.
Perform fuzz testing of compiled binaries.
D.
Perform fuzz testing of compiled binaries.
Answers
Suggested answer: A

Explanation:

Adding a dependency checker into the tool chain is the best recommendation for the company that has been including vulnerable third-party modules in multiple products. A dependency checker is a tool that analyzes the dependencies of a software project and identifies any known vulnerabilities or outdated versions. This can help the developers to update or replace the vulnerable modules before deploying the products.

A penetration tester is testing a web application that is hosted by a public cloud provider. The tester is able to query the provider's metadata and get the credentials used by the instance to authenticate itself. Which of the following vulnerabilities has the tester exploited?

A.
Cross-site request forgery
A.
Cross-site request forgery
Answers
B.
Server-side request forgery
B.
Server-side request forgery
Answers
C.
Remote file inclusion
C.
Remote file inclusion
Answers
D.
Local file inclusion
D.
Local file inclusion
Answers
Suggested answer: B

Explanation:

Server-side request forgery (SSRF) is the vulnerability that the tester exploited by querying the provider's metadata and getting the credentials used by the instance to authenticate itself. SSRF is a type of attack that abuses a web application to make requests to other resources or services on behalf of the web server. This can allow an attacker to access internal or external resources that are otherwise inaccessible or protected. In this case, the tester was able to access the metadata service of the cloud provider, which contains sensitive information about the instance, such as credentials, IP addresses, roles, etc.

Reference: https://owasp.org/www-community/attacks/Server_Side_Request_Forgery

When preparing for an engagement with an enterprise organization, which of the following is one of the MOST important items to develop fully prior to beginning the penetration testing activities?

A.
Clarify the statement of work.
A.
Clarify the statement of work.
Answers
B.
Obtain an asset inventory from the client.
B.
Obtain an asset inventory from the client.
Answers
C.
Interview all stakeholders.
C.
Interview all stakeholders.
Answers
D.
Identify all third parties involved.
D.
Identify all third parties involved.
Answers
Suggested answer: A

Explanation:

Clarifying the statement of work is one of the most important items to develop fully prior to beginning the penetration testing activities, as it defines the scope, objectives, deliverables, and expectations of the engagement. The statement of work is a formal document that outlines the agreement between the penetration tester and the client and serves as a reference for both parties throughout the engagement. It should include details such as the type, duration, and frequency of testing, the target systems and networks, the authorized methods and tools, the reporting format and schedule, and any legal or ethical considerations.

A red-team tester has been contracted to emulate the threat posed by a malicious insider on a company's network, with the constrained objective of gaining access to sensitive personnel files.

During the assessment, the red-team tester identifies an artifact indicating possible prior compromise within the target environment.

Which of the following actions should the tester take?

A.
Perform forensic analysis to isolate the means of compromise and determine attribution.
A.
Perform forensic analysis to isolate the means of compromise and determine attribution.
Answers
B.
Incorporate the newly identified method of compromise into the red team's approach.
B.
Incorporate the newly identified method of compromise into the red team's approach.
Answers
C.
Create a detailed document of findings before continuing with the assessment.
C.
Create a detailed document of findings before continuing with the assessment.
Answers
D.
Halt the assessment and follow the reporting procedures as outlined in the contract.
D.
Halt the assessment and follow the reporting procedures as outlined in the contract.
Answers
Suggested answer: D

Explanation:

Halting the assessment and following the reporting procedures as outlined in the contract is the best action to take after identifying that an application being tested has already been compromised with malware. This is because continuing the assessment might interfere with an ongoing investigation or compromise evidence collection. The reporting procedures are part of the contract that specifies how to handle any critical issues or incidents during the penetration testing engagement. They should include details such as who to contact, what information to provide, and what steps to follow.

A penetration tester writes the following script:

Which of the following objectives is the tester attempting to achieve?

A.
Determine active hosts on the network.
A.
Determine active hosts on the network.
Answers
B.
Set the TTL of ping packets for stealth.
B.
Set the TTL of ping packets for stealth.
Answers
C.
Fill the ARP table of the networked devices.
C.
Fill the ARP table of the networked devices.
Answers
D.
Scan the system on the most used ports.
D.
Scan the system on the most used ports.
Answers
Suggested answer: A

Explanation:

The tester is attempting to determine active hosts on the network by writing a script that pings a range of IP addresses. Ping is a network utility that sends ICMP echo request packets to a host and waits for ICMP echo reply packets. Ping can be used to test whether a host is reachable or not by measuring its response time. The script uses a for loop to iterate over a range of IP addresses from 192.168.1.1 to 192.168.1.254 and pings each one using the ping command with -c 1 option, which specifies one packet per address.

Which of the following should a penetration tester consider FIRST when engaging in a penetration test in a cloud environment?

A.
Whether the cloud service provider allows the penetration tester to test the environment
A.
Whether the cloud service provider allows the penetration tester to test the environment
Answers
B.
Whether the specific cloud services are being used by the application
B.
Whether the specific cloud services are being used by the application
Answers
C.
The geographical location where the cloud services are running
C.
The geographical location where the cloud services are running
Answers
D.
Whether the country where the cloud service is based has any impeding laws
D.
Whether the country where the cloud service is based has any impeding laws
Answers
Suggested answer: A

Explanation:

The first thing that a penetration tester should consider when engaging in a penetration test in a cloud environment is whether the cloud service provider allows the tester to test the environment, as this will determine whether the tester has permission or authorization to perform the test. Some cloud service providers have policies or terms of service that prohibit or restrict penetration testing on their platforms or require prior approval or notification before testing. The tester should review these policies and obtain written consent from the provider before conducting any testing activities.

A penetration tester who is conducting a web-application test discovers a clickjacking vulnerability associated with a login page to financial data. Which of the following should the tester do with this information to make this a successful exploit?

A.
Perform XSS.
A.
Perform XSS.
Answers
B.
Conduct a watering-hole attack.
B.
Conduct a watering-hole attack.
Answers
C.
Use BeEF.
C.
Use BeEF.
Answers
D.
Use browser autopwn.
D.
Use browser autopwn.
Answers
Suggested answer: B

Explanation:

A clickjacking vulnerability allows an attacker to trick a user into clicking on a hidden element on a web page, such as a login button or a link. A watering-hole attack is a technique where the attacker compromises a website that is frequently visited by the target users, and injects malicious code or content into the website. The attacker can then use the clickjacking vulnerability to redirect the users to a malicious website or perform unauthorized actions on their behalf.

A) Perform XSS. This is incorrect. XSS (cross-site scripting) is a vulnerability where an attacker injects malicious scripts into a web page that are executed by the browser of the victim. XSS can be used to steal cookies, session tokens, or other sensitive information, but it is not directly related to clickjacking.

C) Use BeEF. This is incorrect. BeEF (Browser Exploitation Framework) is a tool that allows an attacker to exploit various browser vulnerabilities and take control of the browser of the victim. BeEF can be used to launch clickjacking attacks, but it is not the only way to do so.

D) Use browser autopwn. This is incorrect. Browser autopwn is a feature of Metasploit that automatically exploits browser vulnerabilities and delivers a payload to the victim's system. Browser autopwn can be used to compromise the browser of the victim, but it is not directly related to clickjacking.

Reference:

1: OWASP Foundation, "Clickjacking", https://owasp.org/www-community/attacks/Clickjacking

2: PortSwigger, "What is clickjacking? Tutorial & Examples", https://portswigger.net/websecurity/clickjacking

4: Akto, "Clickjacking: Understanding vulnerability, attacks and prevention",

https://www.akto.io/blog/clickjacking-understanding-vulnerability-attacks-and-prevention

Total 422 questions
Go to page: of 43