PT0-003試験無料問題集「CompTIA PenTest+ 認定」

A penetration tester is performing network reconnaissance. The tester wants to gather information about the network without causing detection mechanisms to flag the reconnaissance activities. Which of the following techniques should the tester use?

解説: (GoShiken メンバーにのみ表示されます)
A penetration tester is performing a cloud-based penetration test against a company. Stakeholders have indicated the priority is to see if the tester can get into privileged systems that are not directly accessible from the internet. Given the following scanner information:
* Server-side request forgery (SSRF) vulnerability in test.comptia.org
* Reflected cross-site scripting (XSS) vulnerability in test2.comptia.org
* Publicly accessible storage system named static_comptia_assets
* SSH port 22 open to the internet on test3.comptia.org
* Open redirect vulnerability in test4.comptia.org
Which of the following attack paths should the tester prioritize first?

解説: (GoShiken メンバーにのみ表示されます)
A penetration tester wants to send a specific network packet with custom flags and sequence numbers to a vulnerable target. Which of the following should the tester use?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following explains the reason a tester would opt to use DREAD over PTES during the planning phase of a penetration test?

解説: (GoShiken メンバーにのみ表示されます)
A penetration tester finds that an application responds with the contents of the /etc/passwd file when the following payload is sent:
xml
Copy code
<?xml version="1.0"?>
<!DOCTYPE data [
<!ENTITY foo SYSTEM "file:///etc/passwd" >
]>
<test>&foo;</test>
Which of the following should the tester recommend in the report to best prevent this type of vulnerability?

解説: (GoShiken メンバーにのみ表示されます)
A penetration tester performs a service enumeration process and receives the following result after scanning a server using the Nmap tool:
PORT STATE SERVICE
22/tcp open ssh
25/tcp filtered smtp
111/tcp open rpcbind
2049/tcp open nfs
Based on the output, which of the following services provides the best target for launching an attack?

解説: (GoShiken メンバーにのみ表示されます)
During a penetration test, the tester gains full access to the application's source code. The application repository includes thousands of code files. Given that the assessment timeline is very short, which of the following approaches would allow the tester to identify hard-coded credentials most effectively?

解説: (GoShiken メンバーにのみ表示されます)
A penetration tester is performing a network security assessment. The tester wants to intercept communication between two users and then view and potentially modify transmitted data. Which of the following types of on- path attacks would be best to allow the penetration tester to achieve this result?

解説: (GoShiken メンバーにのみ表示されます)
A penetration tester is conducting a vulnerability scan. The tester wants to see any vulnerabilities that may be visible from outside of the organization. Which of the following scans should the penetration tester perform?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following frameworks can be used to classify threats?

解説: (GoShiken メンバーにのみ表示されます)
A client warns the assessment team that an ICS application is maintained by the manufacturer. Any tampering of the host could void the enterprise support terms of use.
Which of the following techniques would be most effective to validate whether the application encrypts communications in transit?

解説: (GoShiken メンバーにのみ表示されます)
A penetration tester wants to use PowerView in an AD environment. Which of the following is the most likely reason?

解説: (GoShiken メンバーにのみ表示されます)
During a pre-engagement activity with a new customer, a penetration tester looks for assets to test. Which of the following is an example of a target that can be used for testing?

解説: (GoShiken メンバーにのみ表示されます)
A penetration tester is performing an authorized physical assessment. During the test, the tester observes an access control vestibule and on-site security guards near the entry door in the lobby. Which of the following is the best attack plan for the tester to use in order to gain access to the facility?

解説: (GoShiken メンバーにのみ表示されます)
During a penetration testing exercise, a team decides to use a watering hole strategy. Which of the following is the most effective approach for executing this attack?

解説: (GoShiken メンバーにのみ表示されます)