Searching...
Flashcards in this deck (21)
  • What is the vendor of the CompTIA PenTest+ exam?

    CompTIA

    certification comptia
  • What is the exam code for CompTIA PenTest+?

    PT0-003

    certification comptia
  • What is the name of the exam with code PT0-003?

    CompTIA PenTest+

    certification comptia
  • What is the level of the CompTIA PenTest+ exam?

    EXPERT

    certification comptia
  • What is included in the CompTIA PenTest+ exam description?

    In Progress

    Pending Verification

    Not Verified

    ✔Verified

    certification comptia
  • What does the verified checkmark indicate in the CompTIA PenTest+ exam description?

    It indicates that the exam is verified.

    certification comptia
  • What is depicted in the image related to CompTIA PenTest+?

    A yellow hexagon with the word EXPERT and checkmarks.

    certification comptia
  • Which tool should a penetration tester use to send a specific network packet with custom flags?

    Scapy

    tcpdump

    tcprelay

    Bluecrack

    penetration_testing tools
  • Why would a tester use DREAD over PTES during planning?

    The tester is conducting a web application test.

    The tester is assessing a mobile application.

    The tester is evaluating a thick client application.

    The tester is creating a threat model.

    penetration_testing planning
  • What should a penetration tester use to identify vulnerable open-source libraries?

    SCA

    DAST

    VM

    IAST

    penetration_testing security_review
  • What should be recommended to prevent XML external entity vulnerabilities?

    Disable the use of external entities.

    Drop all excessive file permissions with chmod o-rwx.

    Implement a WAF to filter all incoming requests.

    Ensure the requests application access logs are reviewed frequently.

    penetration_testing vulnerability_management
  • What should a penetration tester do first when developing a phishing campaign for a corporate client that authorized spear phishing?

    Shoulder surfing

    Social media

    Password dumps

    Recon-ng

    penetration_testing phishing
  • What change is required on line 6 of the provided code snippet for checking URL accessibility?

    The method on line 5

    The condition on line 6

    The delimiter in line 3

    The import on line 1

    coding python
  • Which attack requires information about an SPN account as a prerequisite?

    DCShadow

    Kerberoasting

    Golden Ticket

    LSASS dumping

    cybersecurity attacks
  • What is the main purpose of the command 'crackmapexec smb 192.168.1.0/24 -u user.txt -p Summer123@'?

    To execute a command in multiple endpoints at the same time

    To perform a pass-the-hash attack over multiple endpoints within the internal network

    To perform password spraying on internal systems

    To perform common protocol scanning within the internal network

    penetration_testing commands
  • What does the provided code snippet do?

    It checks the accessibility of URLs from a text file and prints 'URL accessible' if the status is 401.

    coding python
  • Which technique should a penetration tester use to disrupt wireless communications for PCs?

    Sidecar scanning

    Port mirroring

    Channel scanning

    ARP poisoning

    penetration_testing wireless
  • Which command should a tester use to enumerate all corporate domain DNS records?

    dig +short A AAAA local.domain

    nslookup -server local.dns.server local.domain *

    nslookup local.domain

    dig afxr @local.dns.server

    penetration_testing dns
  • What technique should a penetration tester use for network reconnaissance without causing detection?

    TCP/UDP scanning

    Sniffing

    Ping sweeps

    Banner grabbing

    penetration_testing reconnaissance
  • Which tool is used to capture plaintext log-in credentials during a security assessment?

    Zed Attack Proxy

    Wireshark

    Metasploit

    Burp Suite

    penetration_testing tools
  • Which command should a tester use to pivot from a compromised host?

    attacker_host$ nmap -sT 127.0.0.1 8000

    attacker_host$ nmap -sT <target_cidr> | nc -n <compromised_host> 22

    attacker_host$ nc -nlp 8000 | nc -n <target_cidr>

    attacker_host$ mknod backpipe p attacker_host$ nc -I -p 8000 | 0 <backpipe | nc <target_cidr> 80 | tee backpipe

    penetration_testing pivoting