C. Misconfigured DHCP server
D. Incorrect credentials
E. Network access controls
26.A penetration tester has successfully exploited an application vulnerability and
wants to remove the command history from the Linux session.
Which of the following will accomplish this successfully?
27.When performing compliance-based assessments, which of the following is the
MOST important Key consideration?
A. Additional rate
B. Company policy
C. Impact tolerance
D. Industry type
29.A penetration tester is designing a phishing campaign and wants to build list of
users (or the target organization.
Which of the following techniques would be the MOST appropriate? (Select TWO)
20 / 30
CompTIA PenTest+ PT0-001 Dumps V10.02 DumpsBase
28.Which of the following BEST explains why it is important to maintain confidentiality
of any identified findings when performing a penetration test?