CompTIA PT0-003 Practice Test - Questions Answers, Page 16
 Add to Whishlist
 
                            Add to Whishlist
                        List of questions
Question 151
 
                            
                            
                                During a discussion of a penetration test final report, the consultant shows the following payload used to attack a system:
html
Copy code
7/<sCRitP>aLeRt('pwned')</ScriPt>
Based on the code, which of the following options represents the attack executed by the tester and the associated countermeasure?
Question 152
 
                            
                            
                                A penetration tester is performing a security review of a web application. Which of the following should the tester leverage to identify the presence of vulnerable open-source libraries?
Question 153
 
                            
                            
                                Which of the following could be used to enhance the quality and reliability of a vulnerability scan report?
Question 154
 
                            
                            
                                A penetration tester launches an attack against company employees. The tester clones the company's intranet log-in page and sends the link via email to all employees. Which of the following best describes the objective and tool selected by the tester to perform this activity?
Question 155
 
                            
                            
                                Which of the following activities should be performed to prevent uploaded web shells from being exploited by others?
Question 156
 
                            
                            
                                During host discovery, a security analyst wants to obtain GeoIP information and a comprehensive summary of exposed services. Which of the following tools is best for this task?
Question 157
 
                            
                            
                                A penetration tester needs to use the native binaries on a system in order to download a file from the internet and evade detection. Which of the following tools would the tester most likely use?
Question 158
 
                            
                            
                                Which of the following techniques is the best way to avoid detection by data loss prevention tools?
Question 159
 
                            
                            
                                While performing a penetration testing exercise, a tester executes the following command:
bash
Copy code
PS c:\tools> c:\hacks\PsExec.exe \\server01.comptia.org -accepteula cmd.exe
Which of the following best explains what the tester is trying to do?
Question 160
 
                            
                            
                                During a penetration testing exercise, a team decides to use a watering hole strategy. Which of the following is the most effective approach for executing this attack?
 
         Unlock Premium Member
  Unlock Premium Member
                                    


 
  
                                            
Question