Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Selected PT0-003 PenTest+ Questions Answers

Page: 7 / 21
Total 298 questions

CompTIA PenTest+ Exam Questions and Answers

Question 25

As part of a security audit, a penetration tester finds an internal application that accepts unexpected user inputs, leading to the execution of arbitrary commands. Which of the following techniques would the penetration tester most likely use to access the sensitive data?

Options:

A.

Logic bomb

B.

SQL injection

C.

Brute-force attack

D.

Cross-site scripting

Question 26

Options:

A.

gc * | select "ProjectX"

B.

dir /R | findstr "ProjectX"

C.

Get-ChildItem * | Select-String "ProjectX"

D.

gci -Path . -Recurse | Select-String -Pattern "ProjectX"

Question 27

A penetration tester is evaluating the security of a corporate client’s web application using federated access. Which of the following approaches has the least possibility of blocking the IP address of the tester’s machine?

Options:

A.

for user in $(cat users.txt); dofor pass in $(cat /usr/share/wordlists/rockyou.txt); docurl -sq -XPOST https://example.com/login.asp -d "username=$user&password=$pass" | grep "Welcome" && echo "OK: $user $pass"done; done

B.

spray365.py generate --password_file passwords.txt --user_file users.txt --domain example.com --delay 1 --execution_plan target.planspray365.py spray target.plan

C.

import requests,pathlibusers=pathlib.Path("users.txt").read_text(); passwords=pathlib.Path("passwords.txt").read_text()for user in user:for pass in passwords:r=requests.post("https://example.com ",data=f"username={user}&password={pass}",headers={"user-agent":"Mozilla/5.0"})if "Welcome" in r.text:print(f"OK: {user} {pass}")

D.

hydra -L users.txt -P /usr/share/wordlists/rockyou.txt http-post-form "/login.asp:username=^USER^&password=^PASS^:Invalid Password"

Question 28

A penetration tester is conducting a vulnerability scan. The tester wants to see any vulnerabilities that may be visible from outside of the organization. Which of the following scans should the penetration tester perform?

Options:

A.

SAST

B.

Sidecar

C.

Unauthenticated

D.

Host-based

Page: 7 / 21
Total 298 questions