exam questions

Exam PT0-001 All Questions

View all questions & answers for the PT0-001 exam

Exam PT0-001 topic 1 question 34 discussion

Actual exam question from CompTIA's PT0-001
Question #: 34
Topic #: 1
[All PT0-001 Questions]

A penetration tester identifies the following findings during an external vulnerability scan:

Which of the following attack strategies should be prioritized from the scan results above?

  • A. Obsolete software may contain exploitable components.
  • B. Weak password management practices may be employed.
  • C. Cryptographically weak protocols may be intercepted.
  • D. Web server configurations may reveal sensitive information.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
mr_robot
Highly Voted 5 years, 1 month ago
PenTest+ Practice Tests Book - SYBEX D. - Port 21 is for TCP and FTP and is used as a control port. Port 80 is for TCP and HTTP and is used for transferring web pages. Port 443 is used for TCP, HTTPS, and is HTTP over TLS/SSL and is for encrypted transmission. In this scenario, all the ports that the penetration tester has discovered have to do with the Web. So, the answer for this question would be that sensitive information may be revealed on the web servers since those were the ports indicated during the vulnerability scan.
upvoted 9 times
...
miabe
Most Recent 2 years, 10 months ago
Selected Answer: A
looks good to me
upvoted 1 times
...
urisoft
3 years, 7 months ago
A. >>> https://vigilance.fr/vulnerability/Apache-httpd-mod-rewrite-open-redirect-31923 "An attacker can deceive the user of Apache httpd mod_rewrite, in order to redirect him to a malicious site." Remediation Upgrade to the latest version of Apache. This issue was fixed in Apache httpd 2.4.41.
upvoted 1 times
...
MrRiver
3 years, 8 months ago
So, thinking about this. C can be ruled out ... you are EXTERNAL ... so under normal circumstancen now way to intercep traffic. So translating the Rest to the Real world: First thing i would do is goging for A. Oboslet Software ... Maybe there is an Apache exploit out there that gives me RCE. This would be the shortest attach path. you could also try to go for weak FTP User Passwords ... but that give you only access to the data of that User. An Apache exploit would give you access to all. D. Also is not usefull ... in the Vul. Listing thers no indication that thers a wrong configuration. Seaching for Exposed config would help finding vulnerabilitys .. But if A. is allready successfull i don't need to find any other vulnerabillitys.
upvoted 2 times
dumdada
3 years, 6 months ago
I agree with this analysis. A seems to be the logical follow-up action. If I see an old Apache server version, you can be sure I'll check for an exploit to some RCE... If it's D, then whoever designed the question/answer on this one has zero industry experience.
upvoted 1 times
...
...
americaman80
4 years ago
D - Explanation: Port 21 is for TCP and FTP and is used as a control port. Port 80 is for TCP and HTTP and is used for transferring web pages. Port 443 is used for TCP, HTTPS, and is HTTP over TLS/SSL and is for encrypted transmission. In this scenario, all the ports that the penetration tester has discovered have to do with the Web. So, the answer for this question would be that sensitive information may be revealed on the web servers since those were the ports indicated during the vulnerability scan.
upvoted 1 times
...
dyers
4 years ago
It's A, note it says on an EXTERNAL vulnerability scan. Ok so HTTP and FTP traffic happens without encryption but how exactly are you intercepting legit user traffic from outside the network? Lots of out-dated items here: Old Windows Server, old Apache, mod_rewrite, lots to potentially exploit.
upvoted 2 times
...
TheThreatGuy
4 years, 4 months ago
Definitely C or D... but I could see an argument for both. But since this is a web server, and it is "configured" to send traffic with weak cleartext protocols, I would choose D.
upvoted 1 times
ufovictim
4 years, 3 months ago
C does seems like a classic CompTIA misdirection answer. Gonna go with D on the test.
upvoted 1 times
...
...
BrokenBandicoot
4 years, 5 months ago
Port 80 is unsecure by default, anything transmitted over Port 80 is in cleartext.
upvoted 1 times
...
byrne
4 years, 6 months ago
Apache mod_rewrite vulnerability cve-2006-3747 https://www.drupal.org/forum/general/news-and-announcements/2006-08-11/apache-mod_rewrite-vulnerability-cve-2006-3747 CVSS v2 Base Score: 7.6 HIGH I'd go for A due to they mention mod_rewrite enabled. But who knows, depending on how many drinks the comptia guy had when writing this question, then it'd be D.
upvoted 4 times
...
[Removed]
4 years, 9 months ago
• 2017 Top 10 • A1:2017-Injection • A2:2017-Broken Authentication • A3:2017-Sensitive Data Exposure • A4:2017-XML External Entities (XXE) • A5:2017-Broken Access Control • A6:2017-Security Misconfiguration • A7:2017-Cross-Site Scripting (XSS) • A8:2017-Insecure Deserialization • A9:2017-Using Components with Known Vulnerabilities • A10:2017-Insufficient Logging & Monitoring
upvoted 2 times
...
D1960
5 years ago
Maybe: Cryptographically weak protocols may be intercepted? Note that Winodows 2012 is has port 21 open. Port 21 is usually for FTP. FTP passes information, including passwords, in clear text. Also, FTP is *not* a web protocol. FTP has been around long before the web.
upvoted 4 times
D1960
5 years ago
Port 21 is known to be easily exploitable: "Port 21 - FTP: This exploit is pretty simple; you go into the metasploitable framework, choose the vsftpd_234 backdoor exploit, set the target IP, and run the exploit. This backdoor gives us root access to the Metasploitable machine." https://akvilekiskis.com/work/metasploitable/index.html
upvoted 4 times
f66
4 years, 8 months ago
SSLv3 is also prone to MiTM attacks
upvoted 1 times
...
tester27
3 years, 11 months ago
i think it's D. I initially thought of C as well, but looking at the Vulnerability column, it just says Windows Server 2012 host found, then port 21, what's the connection, right? Might be FA.
upvoted 1 times
...
...
...
D1960
5 years, 1 month ago
Maybe A. Obsolete software may contain exploitable components? Obsolete, unsupported, software is always a concern. According to the scan, there is obsolete software. For example there are several unsupported versions of Apache found. Also SSLv3 can be a problem.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...