100%(1)1 out of 1 people found this document helpful
This preview shows page 17 - 19 out of 23 pages.
17.An assessor begins an internal security test of the Windows domain internal.comptia.net. The assessor is given network access via DHCP, but is not given any network maps or target IP addresses. Which of the following commands can the assessor use to find any likely Windows domain controllers? A. dig -q any _kerberos._tcp.internal.comptia.net B. dig -q any _lanman._tcp.internal.comptia.net C. dig -q any _ntlm._tcp.internal.comptia.net D. dig -q any _smtp._tcp.internal.comptia.net Answer:A 18.While prioritizing findings and recommendations for an executive summary, which of the following considerations would De MOST valuable to the client? 19.After several attempts, an attacker was able to gain unauthorized access through a biometric sensor using the attacker's actual fingerprint without exploitation. Which of the following is the MOST likely explanation of what happened? 20.A penetration tester successfully exploits a DM2 server that appears to be listening on an outbound
CompTIA PenTest+ PT0-001 Practice Exam V10.02 KilltestThe safer , easier way to help you pass any IT exams.port. The penetration tester wishes to forward that traffic back to a device. Which of the following are the BEST tools to use few this purpose? (Select TWO) 18/ 2221.The results of a basic compliance scan show a subset of assets on a network. This data differs from what is shown on the network architecture diagram, which was supplied at the beginning of the test. Which of the following are the MOST likely causes for this difference? (Select TWO) A. Storage access B. Limited network access C. Misconfigured DHCP server D. Incorrect credentials E. Network access controls Answer:AB 22.A penetration tester has successfully exploited an application vulnerability and wants to remove the command history from the Linux session. Which of the following will accomplish this successfully?