PT0-003試験無料問題集「CompTIA PenTest+ 認定」

A penetration tester currently conducts phishing reconnaissance using various tools and accounts for multiple intelligence-gathering platforms. The tester wants to consolidate some of the tools and accounts into one solution to analyze the output from the intelligence-gathering tools. Which of the following is the best tool for the penetration tester to use?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following describes the process of determining why a vulnerability scanner is not providing results?

解説: (GoShiken メンバーにのみ表示されます)
During an assessment, a penetration tester exploits an SQLi vulnerability. Which of the following commands would allow the penetration tester to enumerate password hashes?

解説: (GoShiken メンバーにのみ表示されます)
A penetration tester reviews a SAST vulnerability scan report. The following vulnerability has been reported as high severity:
Source file: components.ts
Issue 2 of 12: Command injection
Severity: High
Call: .innerHTML = response
The tester inspects the source file and finds the variable response is defined as a constant and is not referred to or used in other sections of the code. Which of the following describes how the tester should classify this reported vulnerability?

解説: (GoShiken メンバーにのみ表示されます)
Before starting an assessment, a penetration tester needs to scan a Class B IPv4 network for open ports in a short amount of time. Which of the following is the best tool for this task?

解説: (GoShiken メンバーにのみ表示されます)
During a penetration test, the tester uses a vulnerability scanner to collect information about any possible vulnerabilities that could be used to compromise the network. The tester receives the results and then executes the following command:
snmpwalk -v 2c -c public 192.168.1.23
Which of the following is the tester trying to do based on the command they used?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following elements in a lock should be aligned to a specific level to allow the key cylinder to turn?

解説: (GoShiken メンバーにのみ表示されます)
Given the following statements:
* Implement a web application firewall.
* Upgrade end-of-life operating systems.
* Implement a secure software development life cycle.
In which of the following sections of a penetration test report would the above statements be found?

解説: (GoShiken メンバーにのみ表示されます)
A penetration tester currently conducts phishing reconnaissance using various tools and accounts for multiple intelligence-gathering platforms. The tester wants to consolidate some of the tools and accounts into one solution to analyze the output from the intelligence-gathering tools. Which of the following is the best tool for the penetration tester to use?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following explains the reason a tester would opt to use DREAD over PTES during the planning phase of a penetration test?

解説: (GoShiken メンバーにのみ表示されます)
During a security assessment, a penetration tester captures plaintext login credentials on the communication between a user and an authentication system. The tester wants to use this information for further unauthorized access.
Which of the following tools is the tester using?

解説: (GoShiken メンバーにのみ表示されます)
While performing an internal assessment, a tester uses the following command:
crackmapexec smb 192.168.1.0/24 -u user.txt -p Summer123@
Which of the following is the main purpose of the command?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following is within the scope of proper handling and is most crucial when working on a penetration testing report?

解説: (GoShiken メンバーにのみ表示されます)
A penetration tester gains initial access to an endpoint and needs to execute a payload to obtain additional access. Which of the following commands should the penetration tester use?

解説: (GoShiken メンバーにのみ表示されます)
A penetration tester creates a list of target domains that require further enumeration. The tester writes the following script to perform vulnerability scanning across the domains:
line 1: #!/usr/bin/bash
line 2: DOMAINS_LIST = "/path/to/list.txt"
line 3: while read -r i; do
line 4: nikto -h $i -o scan-$i.txt &
line 5: done
The script does not work as intended. Which of the following should the tester do to fix the script?

解説: (GoShiken メンバーにのみ表示されます)
A tester obtains access to an endpoint subnet and wants to move laterally in the network. Given the following Nmap scan output:
Nmap scan report for some_host
Host is up (0.01s latency).
PORT STATE SERVICE
445/tcp open microsoft-ds
Host script results:
smb2-security-mode: Message signing disabled
Which of the following command and attack methods is the most appropriate for reducing the chances of being detected?

解説: (GoShiken メンバーにのみ表示されます)