Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following PT0-001 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is PT0-002

PT0-001 Exam Dumps - CompTIA PenTest+ Exam

Go to page:
Question # 4

Which of the following types of intrusion techniques is the use of an “under-the-door tool” during a physical

security assessment an example of?

A.

Lockpicking

B.

Egress sensor triggering

C.

Lock bumping

D.

Lock bypass

Full Access
Question # 5

After establishing a shell on a target system, Joe, a penetration tester is aware that his actions have not been detected. He now wants to maintain persistent access to the machine. Which of the following methods would be MOST easily detected?

A.

Run a zero-day exploit.

B.

Create a new domain user with a known password.

C.

Modify a known boot time service to instantiate a call back.

D.

Obtain cleartext credentials of the compromised user.

Full Access
Question # 6

Prior to a security assessment of a company's user population via spear phishing, which of the following is the MOST appropriate method to de-escalate any incidents or consequences?

A.

Determine the appropriate format and content of the spear-phishing emails.

B.

Send follow-up communication to spear-phishing targets to notify of the assessment.

C.

Carefully prioritize the list of targeted users, excluding high value targets.

D.

Provide limited but necessary communication prior to the assessment.

Full Access
Question # 7

Which of the following tools would a penetration tester leverage to conduct OSINT? (Select TWO).

A.

Shodan

B.

SET

C.

BeEF

D.

Wireshark

E.

Maltego

F.

Dynamo

Full Access
Question # 8

A vulnerability scan is run against a domain hosing a banking application that accepts connections over MTTPS and HTTP protocols Given the following results:

• SSU3 supported

• HSTS not enforced

• Application uses weak ciphers

• Vulnerable to clickjacking

Which of the following should be ranked with the HIGHEST risk?

A.

SSLv3 supported

B.

HSTS not enforced

C.

Application uses week ophers

D.

Vulnerable to clickjacking

Full Access
Go to page: