ExamGecko
Home / CompTIA / PT0-003 / List of questions
Ask Question

CompTIA PT0-003 Practice Test - Questions Answers, Page 14

List of questions

Question 131

Report Export Collapse

A tester obtains access to an endpoint subnet and wants to move laterally in the network. Given the following output:

kotlin

Copy code

Nmap scan report for some_host

Host is up (0.01 latency).

PORT STATE SERVICE

445/tcp open microsoft-ds

Host script results: smb2-security-mode: Message signing disabled

Which of the following command and attack methods is the most appropriate for reducing the chances of being detected?

Become a Premium Member for full access
  Unlock Premium Member

Question 132

Report Export Collapse

During a red-team exercise, a penetration tester obtains an employee's access badge. The tester uses the badge's information to create a duplicate for unauthorized entry. Which of the following best describes this action?

Become a Premium Member for full access
  Unlock Premium Member

Question 133

Report Export Collapse

While conducting an assessment, a penetration tester identifies the details for several unreleased products announced at a company-wide meeting. Which of the following attacks did the tester most likely use to discover this information?

Become a Premium Member for full access
  Unlock Premium Member

Question 134

Report Export Collapse

A penetration tester is conducting reconnaissance on a target network. The tester runs the following Nmap command: nmap -sv -sT -p - 192.168.1.0/24. Which of the following describes the most likely purpose of this scan?

Become a Premium Member for full access
  Unlock Premium Member

Question 135

Report Export Collapse

During a penetration test, the tester gains full access to the application's source code. The application repository includes thousands of code files. Given that the assessment timeline is very short, which of the following approaches would allow the tester to identify hard-coded credentials most effectively?

Become a Premium Member for full access
  Unlock Premium Member

Question 136

Report Export Collapse

Which of the following is the most efficient way to infiltrate a file containing data that could be sensitive?

Become a Premium Member for full access
  Unlock Premium Member

Question 137

Report Export Collapse

Which of the following post-exploitation activities allows a penetration tester to maintain persistent access in a compromised system?

Become a Premium Member for full access
  Unlock Premium Member

Question 138

Report Export Collapse

Which of the following OT protocols sends information in cleartext?

Become a Premium Member for full access
  Unlock Premium Member

Question 139

Report Export Collapse

A penetration tester is getting ready to conduct a vulnerability scan as part of the testing process. The tester will evaluate an environment that consists of a container orchestration cluster. Which of the following tools should the tester use to evaluate the cluster?

Become a Premium Member for full access
  Unlock Premium Member

Question 140

Report Export Collapse

A penetration tester performs a service enumeration process and receives the following result after scanning a server using the Nmap tool:

PORT STATE SERVICE

22/tcp open ssh

25/tcp filtered smtp

111/tcp open rpcbind

2049/tcp open nfs

Based on the output, which of the following services provides the best target for launching an attack?

Become a Premium Member for full access
  Unlock Premium Member
Total 214 questions
Go to page: of 22
Search

Related questions