Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following PT0-001 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is PT0-002

PT0-001 Exam Dumps - CompTIA PenTest+ Exam

Go to page:
Question # 25

A penetration tester is performing a remote scan to determine if the server farm is compliant with the company's software baseline . Which of the following should the penetration tester perform to verify compliance with the baseline?

A.

Discovery scan

B.

Stealth scan

C.

Full scan

D.

Credentialed scan

Full Access
Question # 26

A penetration tester is scoping an engagement with a company that provided a list of firewall rules and a digital network diagram. Which of the following tests would require this data?

A.

Network segmentation test

B.

Network penetration test

C.

Network vulnerability scan

D.

Network baseline test

Full Access
Question # 27

A penetration tester successfully exploits a system, receiving a reverse shell. Which of the following is a

Meterpreter command that is used to harvest locally stored credentials?

A.

background

B.

hashdump

C.

session

D.

getuid

E.

psexec

Full Access
Question # 28

When performing compliance-based assessments, which of the following is the MOST important Key consideration?

A.

Additional rate

B.

Company policy

C.

Impact tolerance

D.

Industry type

Full Access
Question # 29

A penetration tester discovers SNMP on some targets. Which of the following should the penetration tester try FIRST?

A.

Sniff SNMP traffic.

B.

Use default credentials.

C.

Upload a new config file.

D.

Conduct a MITM.

Full Access
Question # 30

When considering threat actor scoping prior to an engagement, which of the following characteristics makes an APT challenging to emulate?

A.

Development of custom zero-day exploits and tools

B.

Leveraging the dark net for non-attribution

C.

Tenacity and efficacy of social engineering attacks

D.

Amount of bandwidth available for DoS attacks

Full Access
Question # 31

A penetration tester is performing a black-box test of a client web application, and the scan host is unable to

access it. The client has sent screenshots showing the system is functioning correctly. Which of the following is

MOST likely the issue?

A.

The penetration tester was not provided with a WSDL file.

B.

The penetration tester needs an OAuth bearer token.

C.

The tester has provided an incorrect password for the application.

D.

An IPS/WAF whitelist is in place to protect the environment.

Full Access
Question # 32

A penetration tester has compromised a system and wishes to connect to a port on it from the attacking machine to control the system Which of the following commands should the tester run on the compromised system?

A.

nc looalhot 4423

B.

nc -nvlp 4423 -« /bin/bash

C.

nc 10.0.0.1 4423

D.

nc 127.0.0.1 4423 -e /bin/bash

Full Access
Go to page: