ExamGecko
Home / CompTIA / PT0-003 / List of questions
Ask Question

CompTIA PT0-003 Practice Test - Questions Answers, Page 17

Add to Whishlist

List of questions

Question 161

Report Export Collapse

A penetration tester finished a security scan and uncovered numerous vulnerabilities on several hosts. Based on the targets' EPSS and CVSS scores, which of the following targets is the most likely to get attacked?

Become a Premium Member for full access
  Unlock Premium Member

Question 162

Report Export Collapse

A penetration tester cannot complete a full vulnerability scan because the client's WAF is blocking communications. During which of the following activities should the penetration tester discuss this issue with the client?

Become a Premium Member for full access
  Unlock Premium Member

Question 163

Report Export Collapse

A client recently hired a penetration testing firm to conduct an assessment of their consumer-facing web application. Several days into the assessment, the client's networking team observes a substantial increase in DNS traffic. Which of the following would most likely explain the increase in DNS traffic?

Become a Premium Member for full access
  Unlock Premium Member

Question 164

Report Export Collapse

A tester compromises a target host and then wants to maintain persistent access. Which of the following is the best way for the attacker to accomplish the objective?

Become a Premium Member for full access
  Unlock Premium Member

Question 165

Report Export Collapse

Which of the following is within the scope of proper handling and most crucial when working on a penetration testing report?

Become a Premium Member for full access
  Unlock Premium Member

Question 166

Report Export Collapse

A penetration tester is researching a path to escalate privileges. While enumerating current user privileges, the tester observes the following output:

mathematica

Copy code

SeAssignPrimaryTokenPrivilege Disabled

SeIncreaseQuotaPrivilege Disabled

SeChangeNotifyPrivilege Enabled

SeManageVolumePrivilege Enabled

SeImpersonatePrivilege Enabled

SeCreateGlobalPrivilege Enabled

SeIncreaseWorkingSetPrivilege Disabled

Which of the following privileges should the tester use to achieve the goal?

Become a Premium Member for full access
  Unlock Premium Member

Question 167

Report Export Collapse

During an assessment, a penetration tester sends the following request:

POST /services/v1/users/create HTTP/1.1

Host: target-application.com

Content-Type: application/json

Content-Length: [dynamic]

Authorization: Bearer (FUZZ)

Which of the following attacks is the penetration tester performing?

Become a Premium Member for full access
  Unlock Premium Member

Question 168

Report Export Collapse

During an assessment, a penetration tester gains access to one of the internal hosts. Given the following command:

schtasks /create /sc onlogon /tn 'Windows Update' /tr 'cmd.exe /c reverse_shell.exe'

Which of the following is the penetration tester trying to do with this code?

Become a Premium Member for full access
  Unlock Premium Member

Question 169

Report Export Collapse

During an internal penetration test, a tester compromises a Windows OS-based endpoint and bypasses the defensive mechanisms. The tester also discovers that the endpoint is part of an Active Directory (AD) local domain.

The tester's main goal is to leverage credentials to authenticate into other systems within the Active Directory environment.

Which of the following steps should the tester take to complete the goal?

Become a Premium Member for full access
  Unlock Premium Member

Question 170

Report Export Collapse

During a security assessment, a penetration tester captures plaintext login credentials on the communication between a user and an authentication system. The tester wants to use this information for further unauthorized access.

Which of the following tools is the tester using?

Become a Premium Member for full access
  Unlock Premium Member
Total 240 questions
Go to page: of 24
Search

Related questions