Pass4itsure > CompTIA > CompTIA Certifications > PT0-001 > PT0-001 Online Practice Questions and Answers

PT0-001 Online Practice Questions and Answers

Questions 4

In a physical penetration testing scenario, the penetration tester obtains physical access to a laptop following potential NEXT step to extract credentials from the device?

A. Brute force the user's password.

B. Perform an ARP spoofing attack.

C. Leverage the BeEF framework to capture credentials.

D. Conduct LLMNR/NETBIOS-ns poisoning.

Buy Now
Questions 5

While reviewing logs, a web developer notices the following user input string in a field:

Which of the following types of attacks was done to the website?

A. XSS injection

B. Blind XSS

C. Reflected XSS

D. Persistent XSS

Buy Now
Questions 6

Which of the following documents BEST describes the manner in which a security assessment will be conducted?

A. BIA

B. SOW

C. SLA

D. MSA

Buy Now
Questions 7

Which of the following actions BEST matches a script kiddie's threat actor?

A. Exfiltrate network diagrams to perform lateral movement

B. Steal credit cards from the database and sell them in the deep web

C. Install a rootkit to maintain access to the corporate network

D. Deface the website of a company in search of retribution

Buy Now
Questions 8

A penetration tester has been assigned to perform an external penetration assessment of a company. Which of the following steps would BEST help with the passive-information-gathering process? (Choose two.)

A. Wait outside of the company's building and attempt to tailgate behind an employee.

B. Perform a vulnerability scan against the company's external netblock, identify exploitable vulnerabilities, and attempt to gain access.

C. Use domain and IP registry websites to identify the company's external netblocks and external facing applications.

D. Search social media for information technology employees who post information about the technologies they work with.

E. Identify the company's external facing webmail application, enumerate user accounts and attempt password guessing to gain access.

Buy Now
Questions 9

After establishing a shell on a target system, Joe, a penetration tester is aware that his actions have not been detected. He now wants to maintain persistent access to the machine. Which of the following methods would be MOST easily detected?

A. Run a zero-day exploit.

B. Create a new domain user with a known password.

C. Modify a known boot time service to instantiate a call back.

D. Obtain cleartext credentials of the compromised user.

Buy Now
Questions 10

A penetration tester is performing a black-box test of a client web application, and the scan host is unable to access it. The client has sent screenshots showing the system is functioning correctly. Which of the following is MOST likely the issue?

A. The penetration tester was not provided with a WSDL file.

B. The penetration tester needs an OAuth bearer token.

C. The tester has provided an incorrect password for the application.

D. An IPS/WAF whitelist is in place to protect the environment.

Buy Now
Questions 11

A penetration tester has SSH access to a Linux server that is exposed to the internet and has access to a corporate internal network. This server, with IP address 200.111.111.9, only has port TCP 22 externally opened. The penetration tester also discovered the internal IP address 192.168.1.5 from a Windows server. Which of the following steps should the penetration tester follow to open an RDP connection to this Windows server and to try to log on?

A. Connect to the Linux server using # ssh 200.111.111.9, establish an RDP connection to the 192.168.1.5 address.

B. Connect to the Windows server using # ssh -L 3389:200.111.111.9:22 192.168.1.5.

C. Connect to the Linux server using # ssh -L 3389:192.168.1.5:3389 200 .111.111.9; RDP to localhost address, port 3389.

D. Connect to the Windows server using # ssh -L 22:200.111.111.9:3389 192.168.1.5.

Buy Now
Questions 12

A client gives a penetration tester a /8 network range to scan during a week-long engagement. Which of the following tools would BEST complete this task quickly?

A. Massscan

B. Nmap

C. Angry IP scanner

D. Unicorn scan

Buy Now
Questions 13

During a penetration test, a host is discovered that appears to have been previously compromised and has an active outbound connection. After verifying the network activity is malicious, which of the following should the tester do?

A. Inform the client to shut it down and investigate.

B. Take action and shut it down immediately.

C. Inform the client and allow them to respond.

D. Note the finding and continue the assessment.

Buy Now
Exam Code: PT0-001
Exam Name: CompTIA PenTest+
Last Update: Apr 01, 2024
Questions: 306
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99