Free PT1-002 Exam Braindumps (page: 4)

Page 3 of 29

A penetration tester recently completed a review of the security of a core network device within a corporate environment. The key ndings are as follows:
* The following request was intercepted going to the network device:

GET /login HTTP/1.1 -
Host: 10.50.100.16 -
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Firefox/31.0

Accept-Language: en-US,en;q=0.5 -

Connection: keep-alive -
Authorization: Basic WU9VUilOQU1FOnNlY3JldHBhc3N3b3jk
* Network management interfaces are available on the production network.
* An Nmap scan returned the following:



Which of the following would be BEST to add to the recommendations section of the nal report? (Choose two.)

  1. Enforce enhanced password complexity requirements.
  2. Disable or upgrade SSH daemon.
  3. Disable HTTP/301 redirect con guration.
  4. Create an out-of-band network for management.
  5. Implement a better method for authentication.
  6. Eliminate network management and control interfaces.

Answer(s): C,E



A penetration tester ran a ping `"A command during an unknown environment test, and it returned a 128 TTL packet.
Which of the following OSs would MOST likely return a packet of this type?

  1. Windows
  2. Apple
  3. Linux
  4. Android

Answer(s): A


Reference:

https://www.freecodecamp.org/news/how-to-identify-basic-internet-problems-with-ping/



A penetration tester who is doing a company-requested assessment would like to send tra c to another system using double tagging.
Which of the following techniques would BEST accomplish this goal?

  1. RFID cloning
  2. RFID tagging
  3. Meta tagging
  4. Tag nesting

Answer(s): C



SIMULATION
You are a penetration tester running port scans on a server.

INSTRUCTIONS:
Part 1: Given the output, construct the command that was used to generate this output from the available options. Part 2: Once the command is appropriately constructed, use the given output to identify the potential attack vectors that should be investigated further.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.




  1. See Explanation section for answer.

Answer(s): A

Explanation:

Part 1 - nmap 192.168.2.2 -sV -O
Part 2 - Weak SMB le permissions






Post your Comments and Discuss CompTIA PT1-002 exam with other Community members:

PT1-002 Exam Discussions & Posts