Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Certification
Study Set
Computing Technology Industry Association (CompTIA)
Exam 12: CompTIA PenTest+ Certification Exam
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 101
Multiple Choice
A client needs to be PCI compliant and has external-facing web servers. Which of the following CVSS vulnerability scores would automatically bring the client out of compliance standards such as PCI 3.x?
Question 102
Multiple Choice
While performing privilege escalation on a Windows 7 workstation, a penetration tester identifies a service that imports a DLL by name rather than an absolute path. To exploit this vulnerability, which of the following criteria must be met?
Question 103
Multiple Choice
A client's systems administrator requests a copy of the report from the penetration tester, but the systems administrator is not listed as a point of contact or signatory. Which of the following is the penetration tester's BEST course of action?
Question 104
Multiple Choice
A consultant is attempting to harvest credentials from unsecure network protocols in use by the organization. Which of the following commands should the consultant use?
Question 105
Multiple Choice
A penetration tester has gained access to a marketing employee's device. The penetration tester wants to ensure that if the access is discovered, control of the device can be regained. Which of the following actions should the penetration tester use to maintain persistence to the device? (Select TWO.)
Question 106
Multiple Choice
A penetration tester is performing a black-box test of a client web application, and the scan host is unable to access it. The client has sent screenshots showing the system is functioning correctly. Which of the following is MOST likely the issue?
Question 107
Multiple Choice
A penetration tester is performing a remote internal penetration test by connecting to the testing system from the Internet via a reverse SSH tunnel. The testing system has been placed on a general user subnet with an IP address of 192.168.1.13 and a gateway of 192.168.1.1. Immediately after running the command below, the penetration tester's SSH connection to the testing platform drops:
Which of the following ettercap commands should the penetration tester use in the future to perform ARP spoofing while maintaining a reliable connection?
Question 108
Multiple Choice
Which of the following can be used to perform online password attacks against RDP?
Question 109
Multiple Choice
At the information gathering stage, a penetration tester is trying to passively identify the technology running on a client's website. Which of the following approached should the penetration tester take?
Question 110
Multiple Choice
Which of the following is the reason why a penetration tester would run the chkconfig --del servicename command at the end of an engagement?
Question 111
Multiple Choice
A penetration tester observes that several high-numbered ports are listening on a public web server. However, the system owner says the application only uses port 443. Which of the following would be BEST to recommend?
Question 112
Multiple Choice
Which of the following BEST describes some significant security weaknesses with an ICS, such as those used in electrical utility facilities, natural gas facilities, dams, and nuclear facilities?
Question 113
Multiple Choice
A penetration tester is planning to conduct a distributed dictionary attack on a government domain against the login portal. The tester will leverage multiple proxies to mask the origin IPs of the attack. Which of the following threat actors will be emulated?
Question 114
Multiple Choice
A security consultant is trying to attack a device with a previously identified user account.
Which of the following types of attacks is being executed?
Question 115
Multiple Choice
A penetration tester is assessing the security of a web form for a client and enters ";id" in one of the fields. The penetration tester observes the following response:
Based on the response, which of the following vulnerabilities exists?
Question 116
Multiple Choice
A penetration tester ran an Nmap scan against a target and received the following output:
Which of the following commands would be best for the penetration tester to execute NEXT to discover any weaknesses or vulnerabilities?
Question 117
Multiple Choice
A penetration tester is performing a wireless penetration test. Which of the following are some vulnerabilities that might allow the penetration tester to easily and quickly access a WPA2-protected access point?