exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 39 discussion

Actual exam question from CompTIA's PT0-002
Question #: 39
Topic #: 1
[All PT0-002 Questions]

A penetration tester is looking for a vulnerability that enables attackers to open doors via a specialized TCP service that is used for a physical access control system. The service exists on more than 100 different hosts, so the tester would like to automate the assessment. Identification requires the penetration tester to:
✑ Have a full TCP connection
✑ Send a `hello` payload
✑ Wait for a response
✑ Send a string of characters longer than 16 bytes
Which of the following approaches would BEST support the objective?

  • A. Run nmap -Pn -sV --script vuln <IP address>.
  • B. Employ an OpenVAS simple scan against the TCP port of the host.
  • C. Create a script in the Lua language and use it with NSE.
  • D. Perform a credentialed scan with Nessus.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ryanzou
Highly Voted 2 years, 7 months ago
Selected Answer: C
C is correct
upvoted 11 times
Manzer
2 years, 6 months ago
https://nmap.org/book/nse-language.html
upvoted 4 times
...
...
Learner213
Most Recent 4 months, 1 week ago
Selected Answer: C
The key phrase in this question is "the tester would like to automate the assessment". Anytime you hear those words, it should remind you of scripting. Correct Answer: C. Create a script in the Lua language and use it with NSE.
upvoted 3 times
...
Etc_Shadow28000
10 months ago
Selected Answer: C
C. This custom script Send a string of characters longer than 16 bytes. This method provides the flexibility to automate the assessment exactly as required, across multiple hosts. Analysis of Other Options: A. Run nmap -Pn -sV –script vuln : This command uses default vulnerability scripts that may not specifically cover the specialized TCP service for physical access control. It lacks the customization needed to meet all the specified steps. B. Employ an OpenVAS simple scan against the TCP port of the host: OpenVAS is a comprehensive vulnerability scanner, but it might not have the specific checks required for the specialized TCP service without custom scripting or configuration. D. Perform a credentialed scan with Nessus: While a credentialed scan with Nessus can provide in-depth vulnerability information, it may not specifically target the specialized TCP service in the manner described without custom plugins or configurations.
upvoted 1 times
...
solutionz
1 year, 9 months ago
Selected Answer: C
The scenario presented requires a specific sequence of actions: establishing a full TCP connection, sending a specific payload, waiting for a response, and then sending another specific string. This custom behavior is unlikely to be covered by generic vulnerability scanning tools or scripts. The best approach to achieve this specific goal would be to create a custom script that implements the required behavior. Nmap's NSE (Nmap Scripting Engine) is designed to allow users to write scripts for specialized network discovery and vulnerability detection tasks, and it uses Lua as its scripting language. Thus, the correct answer is: C. Create a script in the Lua language and use it with NSE.
upvoted 4 times
...
nickwen007
2 years, 1 month ago
The best approach to support the objective is to create a script in the Lua language and use it with NSE. NSE provides an extensive library of scripts that can be used to automate processes such as vulnerability scanning, network discovery, OS detection, etc. The Lua language is a powerful scripting language designed for extensibility and performance, so it is well suited for the task at hand.
upvoted 1 times
...
BOYA2022
2 years, 4 months ago
Selected Answer: C
"...the tester would like to automate the assessment." So C is the only logical answer.
upvoted 4 times
...
masso435
2 years, 5 months ago
Selected Answer: D
Detecting hardware‐related vulnerabilities often requires the use of credentialed scanning, configuration management tools, or other approaches that leverage inside access to the system.
upvoted 1 times
...
Lino_Carbon
2 years, 6 months ago
C is the correct answer
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago