Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam PT0-002 Topic 3 Question 62 Discussion

Actual exam question for CompTIA's PT0-002 exam
Question #: 62
Topic #: 3
[All PT0-002 Questions]

During the assessment of a client's cloud and on-premises environments, a penetration tester was able to gain ownership of a storage object within the cloud environment using the..... premises credentials. Which of the following best describes why the tester was able to gain access?

Show Suggested Answer Hide Answer
Suggested Answer: B

The penetration tester's discovery of passwords vulnerable to hash cracking suggests a lack of robust password policies within the organization. Among the options provided, implementing a blocklist of known bad passwords is the most effective immediate remediation. This measure would prevent users from setting passwords that are easily guessable or commonly used, which are susceptible to hash cracking tools like Hashcat.

Requiring passwords to follow complexity rules (Option A) can be helpful, but attackers can still crack complex passwords if they are common or have been exposed in previous breaches. Setting a minimum password length (Option C) is a good practice, but length alone does not ensure a password's strength against hash cracking techniques. Encrypting passwords with a stronger algorithm (Option D) is a valid long-term strategy but would not prevent users from choosing weak passwords that could be easily guessed before hash cracking is even necessary.

Therefore, a blocklist addresses the specific vulnerability exposed by the penetration tester---users setting weak passwords that can be easily cracked. It's also worth noting that the best practice is a combination of strong, enforced password policies, user education, and the use of multi-factor authentication to enhance security further.


Contribute your Thoughts:

Tamekia
25 days ago
I'm going with B as well. Seems like a classic case of the left hand not knowing what the right hand is doing when it comes to those cloud and on-prem keys.
upvoted 0 times
...
Tambra
28 days ago
Ding ding ding! B is the winner. Gotta love it when poor security practices let the bad guys in.
upvoted 0 times
...
Carrol
1 months ago
Ah, the age-old problem of key management. Bet the tester felt like a kid in a candy store with those on-premises creds!
upvoted 0 times
Taryn
2 days ago
C) laaS failure at the provider
upvoted 0 times
...
Kiley
10 days ago
B) Key mismanagement between the environments
upvoted 0 times
...
Kristeen
20 days ago
A) Federation misconfiguration of the container
upvoted 0 times
...
...
Barb
2 months ago
Hmm, that makes sense too. The tester could have gained access due to misconfiguration of the container.
upvoted 0 times
...
Keshia
2 months ago
I disagree, I believe the correct answer is A) Federation misconfiguration of the container.
upvoted 0 times
...
Barb
2 months ago
I think the answer is B) Key mismanagement between the environments.
upvoted 0 times
...
Stephanie
2 months ago
B) Key mismanagement between the environments seems the most likely culprit here. Poorly managed credentials can definitely lead to cross-environment access issues.
upvoted 0 times
Sena
6 days ago
D) Container listed in the public domain
upvoted 0 times
...
Sheron
22 days ago
C) laaS failure at the provider
upvoted 0 times
...
Rickie
27 days ago
B) Key mismanagement between the environments
upvoted 0 times
...
Angelica
29 days ago
A) Federation misconfiguration of the container
upvoted 0 times
...
...

Save Cancel