최신 PT0-001 무료덤프 - CompTIA PenTest+ Certification
A penetration tester runs the following from a compromised box 'python -c -import pty;Pty.sPawn( "/bin/bash").' Which of the following actions is the tester taking?
정답: C
A penetration tester is preparing for an assessment of a web server's security, which is used to host several sensitive web applications. The web server is PKI protected, and the penetration tester reviews the certificate presented by the server during the SSL handshake. Which of the following certificate fields or extensions would be of MOST use to the penetration tester during an assessment?
정답: B
While prioritizing findings and recommendations for an executive summary, which of the following considerations would De MOST valuable to the client?
정답: B
A client has scheduled a wireless penetration test. Which of the following describes the scoping target information MOST likely needed before testing can begin?
정답: D
A healthcare organization must abide by local regulations to protect and attest to the protection of personal health information of covered individuals. Which of the following conditions should a penetration tester specifically test for when performing an assessment? (Select TWO).
정답: A,D
Which of the following can be used to perform online password attacks against RDP?
정답: C
A penetration tester is performing a validation scan after an organization remediated a vulnerability on port 443 The penetration tester observes the following output:
Which of the following has MOST likely occurred?
Which of the following has MOST likely occurred?
정답: B
A client requests that a penetration tester emulate a help desk technician who was recently laid off. Which of the following BEST describes the abilities of the threat actor?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
A penetration tester observes that several high numbered ports are listening on a public web server. However, the system owner says the application only uses port 443. Which of the following would be BEST to recommend?
정답: C
A technician is reviewing the following report. Given this information, identify which vulnerability can be definitively confirmed to be a false positive by dragging the "false positive" token to the "Confirmed" column for each vulnerability that is a false positive.
정답:
A penetration tester reported the following vulnerabilities:
Which of the following is the correct order to rate the vulnerabilities from critical to low considering the MOST immediate impact?
Which of the following is the correct order to rate the vulnerabilities from critical to low considering the MOST immediate impact?
정답: C
A penetration tester is performing a black-box test of a client web application, and the scan host is unable to access it. The client has sent screenshots showing the system is functioning correctly. Which of the following is MOST likely the issue?
정답: D
Which of the following wordlists is BEST for cracking MD5 password hashes of an application's users from a compromised database?
정답: C
A penetration tester is reviewing the following output from a wireless sniffer:
Which of the following can be extrapolated from the above information?
Which of the following can be extrapolated from the above information?
정답: A