PT0-003 無料問題集「CompTIA PenTest+」

During a security audit, a penetration tester wants to run a process to gather information about a target network's domain structure and associated IP addresses. Which of the following tools should the tester use?

解説: (JPNTest メンバーにのみ表示されます)
A penetration tester needs to confirm the version number of a client's web application server. Which of the following techniques should the penetration tester use?

解説: (JPNTest メンバーにのみ表示されます)
Which of the following could be used to enhance the quality and reliability of a vulnerability scan report?

解説: (JPNTest メンバーにのみ表示されます)
During a security assessment for an internal corporate network, a penetration tester wants to gain unauthorized access to internal resources by executing an attack that uses software to disguise itself as legitimate software. Which of the following host-based attacks should the tester use?

解説: (JPNTest メンバーにのみ表示されます)
During an assessment, a penetration tester gains a low-privilege shell and then runs the following command:
findstr /SIM /C:"pass" *.txt *.cfg *.xml
Which of the following is the penetration tester trying to enumerate?

解説: (JPNTest メンバーにのみ表示されます)
During a web application assessment, a penetration tester identifies an input field that allows JavaScript injection. The tester inserts a line of JavaScript that results in a prompt, presenting a text box when browsing to the page going forward. Which of the following types of attacks is this an example of?

解説: (JPNTest メンバーにのみ表示されます)
A penetration tester needs to help create a threat model of a custom application. Which of the following is the most likely framework the tester will use?

解説: (JPNTest メンバーにのみ表示されます)
A penetration tester wants to send a specific network packet with custom flags and sequence numbers to a vulnerable target. Which of the following should the tester use?

解説: (JPNTest メンバーにのみ表示されます)
A penetration tester identifies an exposed corporate directory containing first and last names and phone numbers for employees. Which of the following attack techniques would be the most effective to pursue if the penetration tester wants to compromise user accounts?

解説: (JPNTest メンバーにのみ表示されます)
A penetration tester obtains password dumps associated with the target and identifies strict lockout policies.
The tester does not want to lock out accounts when attempting access. Which of the following techniques should the tester use?

解説: (JPNTest メンバーにのみ表示されます)
Which of the following is the most efficient way to infiltrate a file containing data that could be sensitive?

解説: (JPNTest メンバーにのみ表示されます)
During a security assessment, a penetration tester captures plaintext login credentials on the communication between a user and an authentication system. The tester wants to use this information for further unauthorized access.
Which of the following tools is the tester using?

解説: (JPNTest メンバーにのみ表示されます)
Which of the following is most important when communicating the need for vulnerability remediation to a client at the conclusion of a penetration test?

解説: (JPNTest メンバーにのみ表示されます)
A penetration tester wants to maintain access to a compromised system after a reboot. Which of the following techniques would be best for the tester to use?

解説: (JPNTest メンバーにのみ表示されます)
During a routine penetration test, the client's security team observes logging alerts that indicate several ID badges were reprinted after working hours without authorization. Which of the following is the penetration tester most likely trying to do?

解説: (JPNTest メンバーにのみ表示されます)
With one day left to complete the testing phase of an engagement, a penetration tester obtains the following results from an Nmap scan:
Not shown: 1670 closed ports
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.2.3 (CentOS)
3306/tcp open mysql MySQL (unauthorized)
8888/tcp open http lighttpd 1.4.32
Which of the following tools should the tester use to quickly identify a potential attack path?

解説: (JPNTest メンバーにのみ表示されます)

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡