CompTIA PenTest+ PT0-002 – Question140

A penetration tester, who is doing an assessment, discovers an administrator has been exfiltrating proprietary company information. The administrator offers to pay the tester to keep quiet. Which of the following is the BEST action for the tester to take?

A.
Check the scoping document to determine if exfiltration is within scope.
B. Stop the penetration test.
C. Escalate the issue.
D. Include the discovery and interaction in the daily report.

Correct Answer: D

CompTIA PenTest+ PT0-002 – Question139

A penetration tester has obtained shell access to a Windows host and wants to run a specially crafted binary for later execution using the ymic.exe process call create function. Which of the following OS or filesystem mechanisms is MOST likely to support this objective?

A.
Alternate data streams
B. PowerShell modules
C. MP4 steganography
D. ProcMon

Correct Answer: D

CompTIA PenTest+ PT0-002 – Question138

An Nmap scan of a network switch reveals the following:

Which of the following technical controls will most likely be the FIRST recommendation for this device?

A.
Encrypted passwords
B. System-hardening techniques
C. Multifactor authentication
D. Network segmentation

Correct Answer: B

CompTIA PenTest+ PT0-002 – Question137

A new security firm is onboarding its first client. The client only allowed testing over the weekend and needed the results Monday morning. However, the assessment team was not able to access the environment as expected until Monday. Which of the following should the security company have acquired BEFORE the start of the assessment?

A.
A signed statement of work
B. The correct user accounts and associated passwords
C. The expected time frame of the assessment
D. The proper emergency contacts for the client

Correct Answer: A

CompTIA PenTest+ PT0-002 – Question136

A penetration tester conducted an assessment on a web server. The logs from this session show the following:

Which of the following attacks is being attempted?

A.
Clickjacking
B. Session hijacking
C. Parameter pollution
D. Cookie hijacking
E. Cross-site scripting

Correct Answer: B

CompTIA PenTest+ PT0-002 – Question135

A physical penetration tester needs to get inside an organization's office and collect sensitive information without acting suspiciously or being noticed by the security guards. The tester has observed that the company's ticket gate does not scan the badges, and employees leave their badges on the table while going to the restroom. Which of the following techniques can the tester use to gain physical access to the office? (Choose two.)

A.
Shoulder surfing
B. Call spoofing
C. Badge stealing
D. Tailgating
E. Dumpster diving
F. Email phishing

Correct Answer: AD

CompTIA PenTest+ PT0-002 – Question134

A penetration tester ran a ping A command during an unknown environment test, and it returned a 128 TTL packet. Which of the following OSs would MOST likely return a packet of this type?

A.
Windows
B. Apple
C. Linux
D. Android

Correct Answer: A

CompTIA PenTest+ PT0-002 – Question133

A private investigation firm is requesting a penetration test to determine the likelihood that attackers can gain access to mobile devices and then exfiltrate data from those devices. Which of the following is a social- engineering method that, if successful, would MOST likely enable both objectives?

A.
Send an SMS with a spoofed service number including a link to download a malicious application.
B. Exploit a vulnerability in the MDM and create a new account and device profile.
C. Perform vishing on the IT help desk to gather a list of approved device IMEIs for masquerading.
D. Infest a website that is often used by employees with malware targeted toward x86 architectures.

Correct Answer: A

CompTIA PenTest+ PT0-002 – Question131

A company is concerned that its cloud service provider is not adequately protecting the VMs housing its software development. The VMs are housed in a datacenter, with other companies sharing physical resources.
Which of the following attack types is MOST concerning to the company?

A.
Data flooding
B. Session riding
C. Cybersquatting
D. Side channel

Correct Answer: D