Exam Logo

Comptia (PT0-001) Exam Questions And Answers page 19

Which of the following commands would allow a penetration tester to access a private network from the Internet in Metasploit?
Attacks and Exploits Penetration Testing Tools
Which of the following CPU registers does the penetration tester need to overwrite in order to exploit a simple buffer overflow?
Attacks and Exploits Penetration Testing Tools
Which of the following has a direct and significant impact on the budget of the security assessment?
Planning and Scoping Reporting and Communication
Which of the following is an important stakeholder to notify when penetration testing has begun?
Planning and Scoping Reporting and Communication
Which of the following is the BEST way to deploy vulnerability scanners with many networks segmented by firewalls with active IPS rules?
Information Gathering and Vulnerability Identification Attacks and Exploits
Which of the following is the MOST comprehensive type of penetration test on a network?
Attacks and Exploits Penetration Testing Tools
Which of the following should a penetration tester verify prior to testing the login and permissions management for a web application that is protected by a CDN-based WAF?
Attacks and Exploits Penetration Testing Tools
Which of the following situations would cause a penetration tester to communicate with a system owner/client during the course of a test? (Select TWO.)
Attacks and Exploits Reporting and Communication
Which of the following types of intrusion techniques is the use of an under-the-door tool during a physical security assessment an example of?
Attacks and Exploits
Which of the following vulnerabilities are MOST likely to be false positives when reported by an automated scanner on a static HTML web page? (Choose two.)
Information Gathering and Vulnerability Identification Attacks and Exploits