nerdexam
CompTIACompTIA

PT0-003 · Question #131

PT0-003 Question #131: Real Exam Question with Answer & Explanation

Sign in or unlock PT0-003 to reveal the answer and full explanation for question #131. The question stem and answer options stay visible for context.

Submitted by manish99· Mar 6, 2026CompTIA PenTest+ Domain 3: Information Gathering and Vulnerability Scanning - specifically constructing and interpreting Nmap scan commands and identifying attack surfaces from scan output.

Question

SIMULATION You are a penetration tester running port scans on a server. INSTRUCTIONS Part1: Given the output, construct the command that was used to generate this output from the available options. Part2: Once the command is appropriately constructed, use the given output to identify the potential attack vectors that should be investigated further. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button. Part1 Part2 Answer: Part 1: nmap -O -sV 192.168.2.2 --top-ports=100 Tried scanning 1 host on my machine. Without -sV you will not get question marks in your port services. We can also clearly see only 100 ports are being scanned. Commander123 is correct. Part 2: Weak SMB file permissions & Null Session Enumeration Because it's obvious port 139 and 445 is open, so that leave SMB vulnerable to weak file permission. This allows for a null session attack to occur.

Options

  • taskConstruct the command used to generate the given port scan output and identify potential attack vectors to investigate further.
  • prerequisites

Unlock PT0-003 to see the answer

You've previewed enough free PT0-003 questions. Unlock PT0-003 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#Nmap#Port Scanning#SMB Vulnerabilities#Penetration Testing
Full PT0-003 PracticeBrowse All PT0-003 Questions