ExamGecko
Home / CompTIA / PT0-003 / List of questions
Ask Question

CompTIA PT0-003 Practice Test - Questions Answers, Page 22

Add to Whishlist

List of questions

Question 211

Report Export Collapse

A penetration tester gains access to a Windows machine and wants to further enumerate users with native operating system credentials. Which of the following should the tester use?

Become a Premium Member for full access
  Unlock Premium Member

Question 212

Report Export Collapse

A penetration tester is conducting an assessment of a web application's login page. The tester needs to determine whether there are any hidden form fields of interest. Which of the following is the most effective technique?

Become a Premium Member for full access
  Unlock Premium Member

Question 213

Report Export Collapse

A penetration tester is trying to get unauthorized access to a web application and executes the following command:

GET /foo/images/file?id=2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2fetc%2fpasswd

Which of the following web application attacks is the tester performing?

Become a Premium Member for full access
  Unlock Premium Member

Question 214

Report Export Collapse

A penetration tester has discovered sensitive files on a system. Assuming exfiltration of the files is part of the scope of the test, which of the following is most likely to evade DLP systems?

Become a Premium Member for full access
  Unlock Premium Member

Question 215

Report Export Collapse

Which of the following can an access control vestibule help deter?

Become a Premium Member for full access
  Unlock Premium Member

Question 216

Report Export Collapse

Which of the following is the most efficient way to exfiltrate a file containing data that could be sensitive?

Become a Premium Member for full access
  Unlock Premium Member

Question 217

Report Export Collapse

[Information Gathering and Vulnerability Scanning]

During an assessment, a penetration tester obtains access to an internal server and would like to perform further reconnaissance by capturing LLMNR traffic. Which of the following tools should the tester use?

Become a Premium Member for full access
  Unlock Premium Member

Question 218

Report Export Collapse

[Attacks and Exploits]

A penetration tester needs to obtain sensitive data from several executives who regularly work while commuting by train. Which of the following methods should the tester use for this task?

Become a Premium Member for full access
  Unlock Premium Member

Question 219

Report Export Collapse

[Attacks and Exploits]

A tester gains initial access to a server and needs to enumerate all corporate domain DNS records. Which of the following commands should the tester use?

Become a Premium Member for full access
  Unlock Premium Member

Question 220

Report Export Collapse

[Information Gathering and Vulnerability Scanning]

A penetration tester observes the following output from an Nmap command while attempting to troubleshoot connectivity to a Linux server:

Starting Nmap 7.91 ( https://nmap.org ) at 2024-01-10 12:00 UTC

Nmap scan report for example.com (192.168.1.10)

Host is up (0.001s latency).

Not shown: 9999 closed ports

PORT STATE SERVICE

21/tcp open ftp

80/tcp open http

135/tcp open msrpc

139/tcp open netbios-ssn

443/tcp open https

2222/tcp open ssh

444/tcp open microsoft-ds

Nmap done: 1 IP address (1 host up) scanned in 0.23 seconds

Which of the following is the most likely reason for the connectivity issue?

Become a Premium Member for full access
  Unlock Premium Member
Total 240 questions
Go to page: of 24
Search

Related questions