ExamGecko
Home / CompTIA / PT0-003 / List of questions
Ask Question

CompTIA PT0-003 Practice Test - Questions Answers, Page 10

Add to Whishlist

List of questions

Question 91

Report Export Collapse

A tester runs an Nmap scan against a Windows server and receives the following results:

Nmap scan report for win_dns.local (10.0.0.5)

Host is up (0.014s latency)

Port State Service

53/tcp open domain

161/tcp open snmp

445/tcp open smb-ds

3389/tcp open rdp

Which of the following TCP ports should be prioritized for using hash-based relays?

Become a Premium Member for full access
  Unlock Premium Member

Question 92

Report Export Collapse

During an assessment, a penetration tester runs the following command:

setspn.exe -Q /

Which of the following attacks is the penetration tester preparing for?

Become a Premium Member for full access
  Unlock Premium Member

Question 93

Report Export Collapse

During an assessment, a penetration tester obtains a low-privilege shell and then runs the following command:

findstr /SIM /C:'pass' *.txt *.cfg *.xml

Which of the following is the penetration tester trying to enumerate?

Become a Premium Member for full access
  Unlock Premium Member

Question 94

Report Export Collapse

During an assessment, a penetration tester wants to extend the vulnerability search to include the use of dynamic testing. Which of the following tools should the tester use?

Become a Premium Member for full access
  Unlock Premium Member

Question 95

Report Export Collapse

During an engagement, a penetration tester found some weaknesses that were common across the customer's entire environment. The weaknesses included the following:

Weaker password settings than the company standard

Systems without the company's endpoint security software installed

Operating systems that were not updated by the patch management system

Which of the following recommendations should the penetration tester provide to address the root issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 96

Report Export Collapse

A penetration tester obtains password dumps associated with the target and identifies strict lockout policies. The tester does not want to lock out accounts when attempting access. Which of the following techniques should the tester use?

Become a Premium Member for full access
  Unlock Premium Member

Question 97

Report Export Collapse

A penetration tester runs a vulnerability scan that identifies several issues across numerous customer hosts. The executive report outlines the following information:

Server High-severity vulnerabilities

1. Development sandbox server 32

2. Back office file transfer server 51

3. Perimeter network web server 14

4. Developer QA server 92

The client is concerned about the availability of its consumer-facing production application. Which of the following hosts should the penetration tester select for additional manual testing?

Become a Premium Member for full access
  Unlock Premium Member

Question 98

Report Export Collapse

A penetration tester is conducting a wireless security assessment for a client with 2.4GHz and 5GHz access points. The tester places a wireless USB dongle in the laptop to start capturing WPA2 handshakes. Which of the following steps should the tester take next?

Become a Premium Member for full access
  Unlock Premium Member

Question 99

Report Export Collapse

A penetration tester gains access to a Windows machine and wants to further enumerate users with native operating system credentials. Which of the following should the tester use?

Become a Premium Member for full access
  Unlock Premium Member

Question 100

Report Export Collapse

Which of the following is a term used to describe a situation in which a penetration tester bypasses physical access controls and gains access to a facility by entering at the same time as an employee?

Become a Premium Member for full access
  Unlock Premium Member
Total 240 questions
Go to page: of 24
Search

Related questions