The results of a basic compliance scan show a subset

This preview shows page 16 - 19 out of 39 pages.

QUESTION: 21 The results of a basic compliance scan show a subset of assets on a network. This data differs from what is shown on the network architecture diagram, which was supplied at the beginning of the test. Which of the following are the MOST likely causes for this difference? (Select TWO) A. Storage access
CompTIA PT0-001
17
QUESTION: 22 A penetration tester has successfully explogted an application vulnerability and wants to remove the command history from the Linux session. Which of the following will accomplish this successfully?
QUESTION: 23 When performing compliance-based assessments, which of the following is the MOST important Key consideration? A. Additional rate B. Company policy C. Impact tolerance D. Industry type Answer: A
QUESTION: 24 Which of the following BEST explains why it is important to maintain confidentiality of any identified findings when performing a penetration test?
QUESTION: 25 A penetration tester is designing a phishing campaign and wants to build list of users (or the target organization. Which of the following techniques would be the MOST appropriate? (Select TWO)
CompTIA PT0-001 “Best Material, Great Results”. 18 QUESTION: 26 A penetration tester notices that the X-Frame-Optjons header on a web application is not set. Which of the following would a malicious actor do to explogt this configuration setting?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture