Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > CompTIA > CompTIA Certifications > PT0-001 > PT0-001 Online Practice Questions and Answers

PT0-001 Online Practice Questions and Answers

Questions 4

Click the exhibit button.

Given the Nikto vulnerability, scan output shown in the exhibit, which of the following exploitation techniques might be used to exploit the target system? (Choose two.)

A. Arbitrary code execution

B. Session hijacking

C. SQL injection

D. Login credential brute-forcing

E. Cross-site request forgery

Buy Now

Correct Answer: BD

Questions 5

A tester has determined that null sessions are enabled on a domain controller. Which of the following attacks can be performed to leverage this vulnerability?

A. RID cycling to enumerate users and groups

B. Pass the hash to relay credentials

C. Password brute forcing to log into the host

D. Session hijacking to impersonate a system account

Buy Now

Correct Answer: D

Questions 6

Given the following script:

Which of the following BEST describes the purpose of this script?

A. Log collection

B. Event logging

C. Keystroke monitoring

D. Debug message collection

Buy Now

Correct Answer: C

Reference: https://www.programcreek.com/python/example/97419/pyHook.HookManager

Questions 7

Which of the following tools is used to perform a credential brute force attack?

A. Hydra

B. John the Ripper

C. Hashcat

D. Peach

Buy Now

Correct Answer: A

Reference https://www.greycampus.com/blog/information-security/brute-force-attacks- prominent-tools-totackle-such-attacks

Questions 8

A client has requested an external network penetration test for compliance purposes. During discussion between the client and the penetration tester, the client expresses unwillingness to add the penetration tester's source IP addresses to the client's IPS whitelist for the duration of the test. Which of the following is the BEST argument as to why the penetration tester's source IP addresses should be whitelisted?

A. Whitelisting prevents a possible inadvertent DoS attack against the IPS and supporting log-monitoring systems.

B. Penetration testing of third-party IPS systems often requires additional documentation and authorizations; potentially delaying the time-sensitive test.

C. IPS whitelisting rules require frequent updates to stay current, constantly developing vulnerabilities and newly discovered weaknesses.

D. Testing should focus on the discovery of possible security issues across all in-scope systems, not on determining the relative effectiveness of active defenses such as an IPS.

Buy Now

Correct Answer: D

Questions 9

A penetration tester is in the process of writing a report that outlines the overall level of risk to operations. In which of the following areas of the report should the penetration tester put this?

A. Appendices

B. Executive summary

C. Technical summary

D. Main body

Buy Now

Correct Answer: B

Questions 10

A penetration tester is performing an annual security assessment for a repeat client The tester finds indicators of previous compromise Which of the following would be the most logical steps to follow NEXT?

A. Report the incident to the tester's immediate manager and follow up with the client immediately

B. Report the incident to the clients Chief Information Security Officer (CISO) immediately and alter the terms of engagement accordingly

C. Report the incident to the client's legal department and then follow up with the client's security operations team

D. Make note of the anomaly, continue with the penetration testing and detail it in the final report

Buy Now

Correct Answer: A

Questions 11

A penetration tester delivers a web application vulnerability scan report to a client. The penetration tester rates a vulnerability as medium severity. The same vulnerability was reported as a critical severity finding on the previous report.

Which of the following is the MOST likely reason for the reduced severity?

A. The client has applied a hot fix without updating the version.

B. The threat landscape has significantly changed.

C. The client has updated their codebase with new features.

D. Thera are currently no known exploits for this vulnerability.

Buy Now

Correct Answer: A

Questions 12

A penetration tester has been asked to conduct a penetration test on a REST-based web service. Which of the following items is required?

A. The latest vulnerability scan results

B. A list of sample application requests

C. An up-to-date list of possible exploits

D. A list of sample test accounts

Buy Now

Correct Answer: B

Questions 13

After establishing a shell on a target system, Joe, a penetration tester is aware that his actions have not been detected. He now wants to maintain persistent access to the machine. Which of the following methods would be MOST easily detected?

A. Run a zero-day exploit.

B. Create a new domain user with a known password.

C. Modify a known boot time service to instantiate a call back.

D. Obtain cleartext credentials of the compromised user.

Buy Now

Correct Answer: C

Exam Code: PT0-001
Exam Name: CompTIA PenTest+
Last Update: Apr 01, 2024
Questions: 306

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.