View Mode
Q: 11

SIMULATION

-


A penetration tester has been provided with only the public domain name and must enumerate additional information for the public-facing assets.



INSTRUCTIONS

-


Select the appropriate answer(s), given the output from each section.


If at any time you would like to bring back the initial state of the simulation, please click the Reset All button. Pentest+ PT0-003 question Pentest+ PT0-003 question Pentest+ PT0-003 question Pentest+ PT0-003 question Pentest+ PT0-003 question Pentest+ PT0-003 question

Your Answer
Q: 12

[Attacks and Exploits] You are a penetration tester running port scans on a server. INSTRUCTIONS Part 1: Given the output, construct the command that was used to generate this output from the available options. Part 2: Once the command is appropriately constructed, use the given output to identify the potential attack vectors that should be investigated further. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button. Pentest+ PT0-003 question Pentest+ PT0-003 question

Your Answer
Q: 13

[Information Gathering and Vulnerability Scanning] A penetration tester performs several Nmap scans against the web application for a client. INSTRUCTIONS Click on the WAF and servers to review the results of the Nmap scans. Then click on each tab to select the appropriate vulnerability and remediation options. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button. Pentest+ PT0-003 question Pentest+ PT0-003 question Pentest+ PT0-003 question Pentest+ PT0-003 question Pentest+ PT0-003 question

Your Answer
Q: 14

HOTSPOT [Information Gathering and Vulnerability Scanning] A penetration tester is performing reconnaissance for a web application assessment. Upon investigation, the tester reviews the robots.txt file for items of interest. INSTRUCTIONS Select the tool the penetration tester should use for further investigation. Select the two entries in the robots.txt file that the penetration tester should recommend for removal. Pentest+ PT0-003 question

Your Answer
Q: 15

HOTSPOT -You are a security analyst tasked with hardening a web server. You have been given a list of HTTP payloads that were flagged as malicious.

INSTRUCTION - Giving the following attack signatures, determine the attack type, and then identify the associated remediation to prevent the attack in the future. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button. Hot Area:

Your Answer
Q: 16

[Attacks and Exploits] A previous penetration test report identified a host with vulnerabilities that was successfully exploited. Management has requested that an internal member of the security team reassess the host to determine if the vulnerability still exists. Pentest+ PT0-003 question Part 1: . Analyze the output and select the command to exploit the vulnerable service. Part 2: . Analyze the output from each command. · Select the appropriate set of commands to escalate privileges. · Identify which remediation steps should be taken. Pentest+ PT0-003 question

Your Answer
Q: 17

[Attacks and Exploits] SIMULATION Using the output, identify potential attack vectors that should be further investigated. Pentest+ PT0-003 question Pentest+ PT0-003 question Pentest+ PT0-003 question Pentest+ PT0-003 question Pentest+ PT0-003 question

Your Answer
Q: 18

DRAG DROP [Tools and Code Analysis] You are a penetration tester reviewing a client’s website through a web browser. INSTRUCTIONS Review all components of the website through the browser to determine if vulnerabilities are present. Remediate ONLY the highest vulnerability from either the certificate, source, or cookies. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button. Pentest+ PT0-003 question Pentest+ PT0-003 question Pentest+ PT0-003 question Pentest+ PT0-003 question Pentest+ PT0-003 question Pentest+ PT0-003 question Pentest+ PT0-003 question

Drag & Drop
Q: 19
A penetration tester has discovered sensitive files on a system. Assuming exfiltration of the files is part of the scope of the test, which of the following is most likely to evade DLP systems?
Options
Q: 20

[Information Gathering and Vulnerability Scanning] During a penetration test, the tester uses a vulnerability scanner to collect information about any possible vulnerabilities that could be used to compromise the network. The tester receives the results and then executes the following command:

snmpwalk -v 2c -c public 192.168.1.23

Which of the following is the tester trying to do based on the command they used?

Options
Question 11 of 20 · Page 2 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE