50%(2)1 out of 2 people found this document helpful
This preview shows page 18 - 26 out of 32 pages.
53.A client has scheduled a wireless penetration test.Which of the following describes the scoping target information MOST likely neededbefore testing can begin?A. The physical location and network ESSIDs to be testedB. The number of wireless devices owned by the clientC. The client's preferred wireless access point vendorD. The bands and frequencies used by the client's devicesAnswer: D54.Which of the following CPU register does the penetration tester need to overwrite
18 / 32
Updated CompTIA PenTest+ PT0-001 V11.02 Dumps Questionsin order to exploit a simple butter overflow?55.A penetration tester identifies the following findings during an external vulnerabilityscan:Which of the following attack strategies should be prioritized from the scan resultsabove?56.DRAG DROPPerformance basedYou are a penetration Inter reviewing a client's website through a web browser.Instructions:Review all components of the website through the browser to determine ifvulnerabilities are present.Remediate ONLY the highest vulnerability from either the certificate source orcookies.19 / 32
Updated CompTIA PenTest+ PT0-001 V11.02 Dumps QuestionsGenerate a Certificate Signing RequestStep 2Submit CSR to the CAStep 3Installed re-issued certificate on the serverStep 4Remove Certificate from Server57.A senior employee received a suspicious email from another executive requestingan urgent wire transfer.Which of the following types of attacks is likely occurring?58.Black box penetration testing strategy provides the tester with:A. a target listB. a network diagramC. source codeD. privileged credentialsAnswer: AExplanation:References: 59.Which of the following is the MOST comprehensive type of penetration test on anetwork?24 / 32