최신 PT0-003 무료덤프 - CompTIA PenTest+
Which of the following post-exploitation activities allows a penetration tester to maintain persistent access in a compromised system?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
During a security assessment, a penetration tester gains access to an internal server and manipulates some data to hide its presence. Which of the following is the best way for the penetration tester to hide the activities performed?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
A penetration tester discovers evidence of an advanced persistent threat on the network that is being tested. Which of the following should the tester do next?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
While conducting a reconnaissance activity, a penetration tester extracts the following information:
Emails: - [email protected] - [email protected] - [email protected]
Which of the following risks should the tester use to leverage an attack as the next step in the security assessment?
Emails: - [email protected] - [email protected] - [email protected]
Which of the following risks should the tester use to leverage an attack as the next step in the security assessment?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
A penetration tester needs to complete cleanup activities from the testing lead. Which of the following should the tester do to validate that reverse shell payloads are no longer running?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
A penetration tester would like to leverage a CSRF vulnerability to gather sensitive details from an application's end users. Which of the following tools should the tester use for this task?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
A penetration tester needs to help create a threat model of a custom application. Which of the following is the most likely framework the tester will use?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
A tester plans to perform an attack technique over a compromised host. The tester prepares a payload using the following command:
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.12.12.1 LPORT=10112 -f csharp The tester then takes the shellcode from the msfvenom command and creates a file called evil.xml. Which of the following commands would most likely be used by the tester to continue with the attack on the host?
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.12.12.1 LPORT=10112 -f csharp The tester then takes the shellcode from the msfvenom command and creates a file called evil.xml. Which of the following commands would most likely be used by the tester to continue with the attack on the host?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
During an engagement, a penetration tester wants to enumerate users from Linux systems by using finger and rwho commands. However, the tester realizes these commands alone will not achieve the desired result. Which of the following is the best tool to use for this task?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
You are a penetration tester reviewing a client's website through a web browser.
INSTRUCTIONS
Review all components of the website through the browser to determine if vulnerabilities are present.
Remediate ONLY the highest vulnerability from either the certificate, source, or cookies.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
INSTRUCTIONS
Review all components of the website through the browser to determine if vulnerabilities are present.
Remediate ONLY the highest vulnerability from either the certificate, source, or cookies.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
정답: