CompTIA PenTest+ PT0-002 – Question150

A penetration tester has found indicators that a privileged user's password might be the same on 30 different Linux systems. Which of the following tools can help the tester identify the number of systems on which the password can be used?

A.
Hydra
B. John the Ripper
C. Cain and Abel
D. Medusa

Correct Answer: A

CompTIA PenTest+ PT0-002 – Question149

Which of the following types of information would MOST likely be included in an application security assessment report addressed to developers? (Choose two.)

A.
Use of non-optimized sort functions
B. Poor input sanitization
C. Null pointer dereferences
D. Non-compliance with code style guide
E. Use of deprecated Javadoc tags
F. A cydomatic complexity score of 3

Correct Answer: BE

CompTIA PenTest+ PT0-002 – Question148

A penetration tester has established an on-path position between a target host and local network services but has not been able to establish an on-path position between the target host and the Internet. Regardless, the tester would like to subtly redirect HTTP connections to a spoofed server IP. Which of the following methods would BEST support the objective?

A.
Gain access to the target host and implant malware specially crafted for this purpose.
B. Exploit the local DNS server and add/update the zone records with a spoofed A record.
C. Use the Scapy utility to overwrite name resolution fields in the DNS query response.
D. Proxy HTTP connections from the target host to that of the spoofed host.

Correct Answer: B

CompTIA PenTest+ PT0-002 – Question147

A tester who is performing a penetration test on a website receives the following output:
Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /var/www/search.php on line 62
Which of the following commands can be used to further attack the website?

A.
<script>var adr = '../evil.php?test=' + escape(document.cookie);</script>
B. ../../../../../../../../../../etc/passwd
C. /var/www/html/index.php;whoami
D. 1 UNION SELECT 1, DATABASE (), 3 —

Correct Answer: A

CompTIA PenTest+ PT0-002 – Question145

During a penetration-testing engagement, a consultant performs reconnaissance of a client to identify potential targets for a phishing campaign. Which of the following would allow the consultant to retrieve email addresses for technical and billing contacts quickly, without triggering any of the client's cybersecurity tools? (Choose two.)

A.
Scraping social media sites
B. Using the WHOIS lookup tool
C. Crawling the client's website
D. Phishing company employees
E. Utilizing DNS lookup tools
F. Conducting wardriving near the client facility

Correct Answer: BC

CompTIA PenTest+ PT0-002 – Question144

A penetration tester needs to upload the results of a port scan to a centralized security tool. Which of the following commands would allow the tester to save the results in an interchangeable format?

A.
nmap -iL results 192.168.0.10-100
B. nmap 192.168.0.10-100 -O > results
C. nmap -A 192.168.0.10-100 -oX results
D. nmap 192.168.0.10-100 | grep "results"

Correct Answer: C

CompTIA PenTest+ PT0-002 – Question143

A penetration tester runs a scan against a server and obtains the following output:

Which of the following command sequences should the penetration tester try NEXT?

A.
ftp 192.168.53.23
B. smbclient \\WEB3\IPC$ -I 192.168.53.23 -U guest
C. ncrack -u Administrator -P 15worst_passwords.txt -p rdp 192.168.53.23
D. curl -X TRACE https://192.168.53.23:8443/index.aspx

Correct Answer: A

CompTIA PenTest+ PT0-002 – Question141

A Chief Information Security Officer wants to evaluate the security of the company's e-commerce application.
Which of the following tools should a penetration tester use FIRST to obtain relevant information from the application without triggering alarms?

A.
SQLmap
B. DirBuster
C. w3af
D. OWASP ZAP

Correct Answer: D