Exam Logo

Comptia (PT0-001) Exam Questions And Answers page 5

A penetration tester has access to a local machine running Linux, but the account has limited privileges. Which of the following types of files could the tester BEST use for privilege escalation?
Attacks and Exploits Penetration Testing Tools
A penetration tester has a full shell to a domain controller and wants to discover any user account that has not authenticated to the domain in 21 days. Which of the following commands would BEST accomplish this?
Attacks and Exploits Penetration Testing Tools
A penetration tester has been asked to conduct a penetration test on a REST-based web service. Which of the following items is required?
Attacks and Exploits Penetration Testing Tools
A penetration tester has been asked to conduct OS fingering with Nmap using a company-provided text file that contains a list of IP addresses. Which of the following are needed to conduct this scan? (Choose two.)
Information Gathering and Vulnerability Identification Penetration Testing Tools
A penetration tester has been asked to conduct OS fingering with Nmap using a company-provided text file that contains a list of IP addresses. Which of the following are needed to conduct this scan? (Choose two.).
Information Gathering and Vulnerability Identification Penetration Testing Tools
A penetration tester has been assigned to perform an external penetration assessment of a company. Which of the following steps would BEST help with the passive-information-gathering process? (Choose two.)
Planning and Scoping Information Gathering and Vulnerability Identification
A penetration tester has been hired to perform a penetration test for an organization. Which of the following is indicative of an error-based SQL injection attack?
Attacks and Exploits Penetration Testing Tools
A penetration tester has compromised a host. Which of the following would be the correct syntax to create a Netcat listener on the device?
Attacks and Exploits Penetration Testing Tools
A penetration tester has compromised a Windows server and is attempting to achieve persistence. Which of the following would achieve that goal?
Attacks and Exploits Penetration Testing Tools
A penetration tester has gained access to a marketing employee's device. The penetration tester wants to ensure that if the access is discovered, control of the device can be regained. Which of the following actions should the penetration tester use to maintain persistence to the device? (Select TWO.)
Attacks and Exploits Penetration Testing Tools