pt003
pt003
Which of the following is the best way for the penetration tester to hide the activities
performed?
engagement.
Action | SRC
| DEST
| --
Block |. | . | *
Latches
Pins
Shackle
Plug
4. A penetration tester assesses an application allow list and has limited command-line
access on the Windows system.
Which of the following would give the penetration tester information that could aid in
continuing the test?
mmc.exe
icacls.exe
nltest.exe
rundll.exe
5. A penetration tester wants to use multiple TTPs to assess the reactions (alerted,
blocked, and others) by the client’s current security tools. The threat-modeling team
indicates the TTPs in the list might affect their internal systems and servers.
Which of the following actions would the tester most likely take?
Use a BAS tool to test multiple TTPs based on the input from the threat-modeling team.
Perform an internal vulnerability assessment with credentials to review the internal attack
surface.
Use a generic vulnerability scanner to test the TTPs and review the results with the threat-
modeling team.
Perform a full internal penetration test to review all the possible exploits that could affect the
systems.
6. As part of a security audit, a penetration tester finds an internal application that accepts
unexpected user inputs, leading to the execution of arbitrary commands.
Which of the following techniques would the penetration tester most likely use to access
the sensitive data?
Logic bomb
SQL injection
Brute-force attack
Cross-site scripting
7. A penetration tester identifies an exposed corporate directory containing first and last
names and phone numbers for employees.
Which of the following attack techniques would be the most effective to pursue if the
penetration tester wants to compromise user accounts?
Smishing
Impersonation
Tailgating
Whaling
8. A penetration tester is compiling the final report for a recently completed engagement.
A junior QA team member wants to know where they can find details on the impact,
overall security findings, and high-level statements.
Which of the following sections of the report would most likely contain this information?
Quality control
Methodology
Executive summary
Risk scoring
9. A tester completed a report for a new client.
Prior to sharing the report with the client, which of the following should the tester request
to complete a review?
A generative AI assistant
The customer's designated contact
A cybersecurity industry peer
A team member
10. During an assessment, a penetration tester exploits an SQLi vulnerability.
Which of the following commands would allow the penetration tester to enumerate
password hashes?
Which of the following tools should the penetration tester use to continue the attack?
Responder
Hydra
BloodHound
CrackMapExec
12. A penetration tester needs to collect information over the network for further steps in
an internal assessment.
1 network_addr="192.168.1"
2 for h in {1..254}; do
4 if [ $? -eq 0 ]; then
8 fi
9 done
Which of the following tools would most likely assist with testing the security of the web
application?
OpenVAS
Nessus
sqlmap
Nikto
15. A penetration tester needs to launch an Nmap scan to find the state of the port for
both TCP and UDP services.
The tester then takes the shellcode from the msfvenom command and creates a file called
evil.xml.
Which of the following commands would most likely be used by the tester to continue
with the attack on the host?
regsvr32 /s /n /u C:evil.xml
MSBuild.exe C:evil.xml
mshta.exe C:evil.xml
AppInstaller.exe C:evil.xml
17. A tester performs a vulnerability scan and identifies several outdated libraries used
within the customer SaaS product offering.
Which of the following types of scans did the tester use to identify the libraries?
IAST
SBOM
DAST
SAST
18. A penetration tester performs an assessment on the target company's Kubernetes
cluster using kube-hunter.
Which of the following types of vulnerabilities could be detected with the tool?
In which of the following sections of a penetration test report would the above statements
be found?
Executive summary
Attack narrative
Detailed findings
Recommendations
21. During a penetration test, a tester captures information about an SPN account.
Golden Ticket
Kerberoasting
DCShadow
LSASS dumping
22. A penetration tester attempts to run an automated web application scanner against a
target URL. The tester validates that the web page is accessible from a different device.
The tester analyzes the following HTTP request header logging output:
Which of the following actions should the tester take to get the scans to work properly?
Which of the following describes the information the junior tester will receive from the
Hunter.io tool?
A collection of email addresses for the target domain that is available on multiple sources on
the internet
DNS records for the target domain and subdomains that could be used to increase the
external attack surface
Data breach information about the organization that could be used for additional
enumeration
Information from the target's main web page that collects usernames, metadata, and
possible data exposures
24. A penetration tester downloads a JAR file that is used in an organization's production
environment. The tester evaluates the contents of the JAR file to identify potentially
vulnerable components that can be targeted for exploit.
SAST
SBOM
ICS
SCA
25. During a penetration testing engagement, a tester targets the internet-facing services
used by the client.
Which of the following describes the type of assessment that should be considered in this
scope of work?
Segmentation
Mobile
External
Web
26. A penetration tester has just started a new engagement. The tester is using a
framework that breaks the life cycle into 14 components.
OWASP MASVS
OSSTMM
MITRE ATT&CK
CREST
27. A penetration tester is evaluating a SCADA system. The tester receives local access to
a workstation that is running a single application. While navigating through the
application, the tester opens a terminal window and gains access to the underlying
operating system.
Kiosk escape
Arbitrary code execution
Process hollowing
Library injection
28. A penetration tester presents the following findings to stakeholders:
Based on the findings, which of the following recommendations should the tester make?
(Select two).
Which of the following risks should the tester use to leverage an attack as the next step in
the security assessment?
Which of the following is the best way for the tester to further enumerate the host and the
environment in which it resides?
ProxyChains
Netcat
PowerShell ISE
Process IDs
31. A penetration tester has found a web application that is running on a cloud virtual
machine instance. Vulnerability scans show a potential SSRF for the same application
URL path with an injectable parameter.
Which of the following commands should the tester run to successfully test for secrets
exposure exploitability?
curl <url>?param=http://169.254.169.254/latest/meta-data/
curl '<url>?param=http://127.0.0.1/etc/passwd'
curl '<url>?param=<script>alert(1)<script>/'
curl <url>?param=http://127.0.0.1/
32. A penetration tester cannot find information on the target company's systems using
common OSINT methods. The tester's attempts to do reconnaissance against internet-
facing resources have been blocked by the company's WAF.
Which of the following is the best way to avoid the WAF and gather information about the
target company's systems?
HTML scraping
Code repository scanning
Directory enumeration
Port scanning
33. During a penetration test, the tester uses a vulnerability scanner to collect information
about any possible vulnerabilities that could be used to compromise the network.
The tester receives the results and then executes the following command:
Which of the following is the tester trying to do based on the command they used?
Burp Suite
masscan
Nmap
hping
36. A penetration tester is performing an authorized physical assessment. During the test,
the tester observes an access control vestibule and on-site security guards near the entry
door in the lobby.
Which of the following is the best attack plan for the tester to use in order to gain access
to the facility?
Clone badge information in public areas of the facility to gain access to restricted areas.
Tailgate into the facility during a very busy time to gain initial access.
Pick the lock on the rear entrance to gain access to the facility and try to gain access.
Drop USB devices with malware outside of the facility in order to gain access to internal
machines.
37. During a web application assessment, a penetration tester identifies an input field that
allows JavaScript injection. The tester inserts a line of JavaScript that results in a prompt,
presenting a text box when browsing to the page going forward.
Which of the following types of attacks is this an example of?
SQL injection
SSRF
XSS
Server-side template injection
38. A penetration tester is working on an engagement in which a main objective is to
collect confidential information that could be used to exfiltrate data and perform a
ransomware attack. During the engagement, the tester is able to obtain an internal
foothold on the target network.
Which of the following is the next task the tester should complete to accomplish the
objective?
Which of the following technical controls should the tester recommend to reduce the risk
of compromise?
Multifactor authentication
Patch management
System hardening
Network segmentation
40. A penetration tester writes the following script to enumerate a 1724 network:
1 #!/bin/bash
2 for i in {1..254}; do
4 done
The tester executes the script, but it fails with the following error:
Dnsenum
Nmap
Netcat
Wireshark
45. During an external penetration test, a tester receives the following output from a tool:
test.comptia.org
info.comptia.org
vpn.comptia.org
exam.comptia.org
Which of the following commands did the tester most likely run to get these results?
Which of the following would most likely be a function of the rules of engagement?
Testing window
Terms of service
Authorization letter
Shared responsibilities
47. A penetration tester needs to complete cleanup activities from the testing lead.
Which of the following should the tester do to validate that reverse shell payloads are no
longer running?
1 #!/bin/bash
3 curl $i
4 done
Which of the following changes should the team make to line 3 of the script?
resolvconf $i
rndc $i
systemd-resolve $i
host $i
49. A penetration tester needs to test a very large number of URLs for public access.
1 import requests
2 import pathlib
5 response = requests.get(url)
6 if response.status == 401:
7 print("URL accessible")
Which of the following techniques would be best for the tester to use?