CompTIA PT0-003 Practice Test - Questions Answers, Page 23

List of questions
Question 221

[Attacks and Exploits]
A penetration tester is preparing a password-spraying attack against a known list of users for the company 'example'. The tester is using the following list of commands:
pw-inspector -i sailwords -t 8 -S pass
spray365.py spray -ep plan
users='~/user.txt'; allwords='~/words.txt'; pass='~/passwords.txt'; plan='~/spray.plan'
spray365.py generate --password-file $pass --userfile $user --domain 'example.com' --execution-plan $plan
cew -m 5 'http://www.example.com' -w sailwords
Which of the following is the correct order for the list of the commands?
Question 222

[Attacks and Exploits]
Which of the following methods should a physical penetration tester employ to access a rarely used door that has electronic locking mechanisms?
Question 223

With one day left to complete the testing phase of an engagement, a penetration tester obtains the following results from an Nmap scan:
Not shown: 1670 closed ports
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.2.3 (CentOS)
3306/tcp open mysql MySQL (unauthorized)
8888/tcp open http lighttpd 1.4.32
Which of the following tools should the tester use to quickly identify a potential attack path?
Question 224

[Attacks and Exploits]
A penetration tester wants to send a specific network packet with custom flags and sequence numbers to a vulnerable target. Which of the following should the tester use?
Question 225

[Attacks and Exploits]
Which of the following frameworks can be used to classify threats?
Question 226

[Information Gathering and Vulnerability Scanning]
A penetration tester is enumerating a Linux system. The goal is to modify the following script to provide more comprehensive system information:
#!/bin/bash
ps aux >> linux_enum.txt
Which of the following lines would provide the most comprehensive enumeration of the system?
Question 227

[Reporting and Communication]
Which of the following components should a penetration tester include in the final assessment report?
Question 228

[Reporting and Communication]
Which of the following elements of a penetration test report can be used to most effectively prioritize the remediation efforts for all the findings?
Question 229

[Tools and Code Analysis]
A penetration tester compromises a Windows OS endpoint that is joined to an Active Directory local environment. Which of the following tools should the tester use to manipulate authentication mechanisms to move laterally in the network?
Question 230

[Reporting and Communication]
Which of the following components should a penetration tester include in an assessment report?
Question