QUESTION 1 Which of the following tools is used to perform...

This preview shows page 1 - 5 out of 15 pages.

PT0-001.exam.28q Number : PT0-001 Passing Score : 800 Time Limit : 120 min PT0-001 CompTIA PenTest+ Certification
Exam A QUESTION 1 Which of the following tools is used to perform a credential brute force attack? A
Section: (none) Explanation Explanation/Reference: Reference QUESTION 2 Which of the following is the reason why a penetration tester would run the chkconfig --del servicename command at the end of an engagement? A
Section: (none) Explanation Explanation/Reference:
QUESTION 3 A penetration tester wants to target NETBIOS name service. Which of the following is the MOST likely command to exploit the NETBIOS name service? A. arpspoof B. nmap C. responder D. burpsuite Correct Answer: B
Section: (none) Explanation Explanation/Reference: References QUESTION 4 A penetration tester executes the following commands: Which of the following is a local host vulnerability that the attacker is exploiting?
A
Section: (none) Explanation Explanation/Reference: References QUESTION 5 A penetration tester reviews the scan results of a web application. Which of the following vulnerabilities is MOST critical and should be prioritized for exploitation? A
Section: (none) Explanation Explanation/Reference: References (XSS) QUESTION 6 A penetration tester observes that several high-numbered ports are listening on a public web server. However, the system owner says the application only uses port 443. Which of the following would be BEST to recommend? D
Section: (none) Explanation Explanation/Reference:

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture