If you are one of the candidates for the following CompTIA PenTest+ Certification Exam dumps, Dynamic Skills is definitely the best place for your PenTest+ exam preparation. We cover all the topics that may appear in the CompTIA PenTest+ Certification Exam) actual exam.
We promise that you will get a high passing mark based on our updated PenTest+ exam practice questions.
Here are some demo questions:
Question 01
Which of the following situations would cause a penetration tester to communicate with a system owner/client during the course of a test? (Select TWO.)
A. The system becomes unavailable following an attempted exploit.
B. The tester discovers personally identifiable data on the system.
C. The system shows evidence of prior unauthorized compromise.
D. The system shows a lack of hardening throughout.
E. The tester discovers a finding on an out-of-scope system.
Question 02
A penetration tester reports an application is only utilizing basic authentication on an Internet-facing application. Which of the following would be the BEST remediation strategy?
A. Sanitize invalid user input.
B. Enable HTTP Strict Transport Security.
C. Enable a secure cookie flag.
D. Encrypt the communication channel.
Question 03
A penetration test was performed by an on-staff junior technician. During the test, the technician discovered the web application could disclose an SQL table with user account and password information. Which of the following is the MOST effective way to notify management of this finding and its importance?
A.Connect to the SQL server using this information and change the password to one or two non-critical accounts to demonstrate a proof--of-concept to management.
B. Request that management create an RFP to begin a formal engagement with a professional penetration testing company.
C. Document the findings with an executive summary, recommendations, and screenshots of the web application disclosure.
D. Notify the development team of the discovery and suggest that input validation be implemented with a professional penetration testing company.
Question 04
A tester was able to retrieve domain users’ hashes. Which of the following tools can be used to uncover the users’ passwords? (Choose two.)
A. Mimikatz
B. Hashcat
C. Hydra
D. PSExec
E. John the Ripper
F. Nessus
Question 05
A MITM attack is being planned. The first step is to get information flowing through a controlled device. Which of the following should be used to accomplish this?
A. Replay attack
B. Repeating
C. War driving
D. Evil twin
E. Bluejacking
Enroll Now