exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 173 discussion

Actual exam question from CompTIA's PT0-002
Question #: 173
Topic #: 1
[All PT0-002 Questions]

A penetration tester has identified several newly released CVEs on a VoIP call manager. The scanning tool the tester used determined the possible presence of the CVEs based off the number of the service. Which of the following methods would BEST support validation of the possible findings?

  • A. Manually check the version number of the VoIP service against the CVE release.
  • B. Test with proof-of-concept code from an exploit database on a non-production system.
  • C. Review SIP traffic from an on-path position to look for indicators of compromise.
  • D. Execute an nmap -sV scan against the service.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
kmanb
Highly Voted 2 years, 4 months ago
This looks like A here. The CVE would show the version numbers that the vulnerability impacted
upvoted 5 times
...
Etc_Shadow28000
Most Recent 11 months, 1 week ago
Selected Answer: B
The method that would best support the validation of the possible findings based on newly released CVEs identified on a VoIP call manager is: B. Test with proof-of-concept code from an exploit database on a non-production system. Explanation: • Testing with proof-of-concept code: This approach involves using exploit code available in public exploit databases to test the vulnerabilities directly. This method provides direct evidence of whether the vulnerabilities are present and exploitable in the VoIP call manager. By testing in a non-production environment, the tester avoids disrupting critical services while obtaining reliable validation of the findings.
upvoted 2 times
...
TiredOfTests
1 year, 7 months ago
Selected Answer: A
CompTIA has asked similar questions before on previous exams. It's always a manual check as the answer.
upvoted 4 times
...
solutionz
1 year, 10 months ago
Selected Answer: A
To validate the possible findings related to the newly released CVEs on a VoIP call manager, it's essential to confirm that the identified vulnerabilities are indeed present in the specific version of the service running. Among the given options, the BEST method for achieving this would be: A. Manually check the version number of the VoIP service against the CVE release. Explanation: This option involves manually comparing the version number of the VoIP service with the information provided in the CVE release. By doing so, the penetration tester can directly confirm whether the identified vulnerabilities apply to the version in use. This is a precise and careful approach that avoids unnecessary risks. Other options are not as suitable for validation:
upvoted 3 times
...
manhthi
2 years, 1 month ago
Selected Answer: A
According ChatGPT Option A, manually checking the version number of the VoIP service against the CVE release, would be the BEST method to validate the possible findings. This would involve reviewing the version number of the VoIP service and comparing it to the list of published CVEs to confirm whether the service is affected by the identified CVEs. This method is more accurate and less risky than option B, which involves using proof-of-concept code from an exploit database on a non-production system, as this could potentially cause disruption to the non-production system
upvoted 1 times
...
[Removed]
2 years, 1 month ago
Selected Answer: B
A requires more time and is a viable option just not the best B less time and is the best answer to confirm it is an issue
upvoted 1 times
mouettespaghetti
1 year, 10 months ago
B is less time ? Are you high lol. I don't know if you work in IT but most companies dont have off production network to test things out...
upvoted 4 times
...
...
[Removed]
2 years, 1 month ago
Selected Answer: B
B. Test with proof-of-concept code from an exploit database on a non-production system would be the BEST method to validate the possible findings. Running a proof-of-concept exploit on a non-production system can confirm the presence of the vulnerability without risking production systems. Once the vulnerability has been validated, appropriate remediation or mitigation measures can be taken. Manually checking the version number of the VoIP service against the CVE release or executing an nmap -sV scan can help in determining the potential presence of vulnerabilities, but may not confirm the presence of the vulnerability. Reviewing SIP traffic from an on-path position to look for indicators of compromise may help in identifying an ongoing attack, but may not be useful for validating the possible findings.
upvoted 1 times
[Removed]
2 years, 1 month ago
Answer A is partially correct, but it is not the best approach as it involves manual work, which can be prone to errors and time-consuming. Answer C is not the best approach because it is not practical to capture all SIP traffic for validation. It is not scalable and can generate a large amount of irrelevant data. Additionally, it might not be possible to capture all relevant SIP traffic. Therefore, answer B is the best approach as it uses proof-of-concept code from an exploit database on a non-production system, which is a safe and efficient way to validate the possible findings.
upvoted 1 times
...
...
cy_analyst
2 years, 2 months ago
Selected Answer: A
Option A would be the best method to validate the possible findings. Manually checking the version number of the VoIP service against the CVE release would provide a direct and reliable method to confirm whether the CVEs apply to the system. Option B might provide some additional confirmation, but it is also risky as the proof-of-concept code could potentially harm the non-production system, and might not necessarily provide a conclusive result. Option C might be useful for detecting ongoing attacks, but it wouldn't necessarily provide validation for the presence of the identified CVEs. Option D, an nmap -sV scan, might help to determine the version number of the service, but it might not necessarily provide definitive proof of the presence of the CVEs. Therefore, option A would be the best method to validate the possible findings.
upvoted 3 times
KingIT_ENG
2 years, 2 months ago
Your sure A is correct then B?
upvoted 1 times
cy_analyst
2 years, 2 months ago
After A I would go with C and then B because with C I can check real time for the validity of the vulnerability. For B of course is a valid choice but I don't think I will always have a spare device to check with.
upvoted 1 times
...
...
...
KingIT_ENG
2 years, 2 months ago
B 90% A 80% i go with B
upvoted 1 times
...
nickwen007
2 years, 2 months ago
When manually checking the version number of the VoIP service against the CVE release, it is important to look for any discrepancies between the version numbers being reported. If the version numbers don't match up, it could indicate that the software is not up-to-date and vulnerable to attack. Additionally, when manually checking against CVEs, you should always confirm that the CVEs have been released and not just reported but unconfirmed.
upvoted 2 times
[Removed]
2 years, 2 months ago
The question says "The scanning tool the tester used determined the possible presence of the CVEs based off the version number of the service." Why would you scan it again after you've already got service information from a previous scan? This is why the answer should be B
upvoted 1 times
...
[Removed]
2 years, 2 months ago
A or B ?
upvoted 1 times
...
...
kloug
2 years, 3 months ago
aaaaaaaa
upvoted 3 times
...
shakevia463
2 years, 3 months ago
Selected Answer: B
has identified several newly released CVEs on a VoIP call manager. presence of the CVEs based off the version number of the service. How would A help at this point?
upvoted 1 times
...
2Fish
2 years, 4 months ago
This is tough.. at first I thought A, but leaning more towards B now that I looked at it more and found this link. https://www.examtopics.com/discussions/comptia/view/69642-exam-pt1-002-topic-1-question-41-discussion/
upvoted 1 times
Vikt0r
2 years, 3 months ago
I think it's A. You wouldn't exploit anything without legal agreements. Or else you risk recourse from the company.
upvoted 4 times
2Fish
2 years, 3 months ago
I see what your saying, but this is a non-production system, so maybe a sandbox? This question sucks either way.
upvoted 3 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...