PT0-001試験無料問題集「CompTIA PenTest+ Certification 認定」

A penetration tester was able to retrieve the initial VPN user domain credentials by phishing a member of the IT department. Afterward, the penetration tester obtained hashes over the VPN and easily cracked them using a dictionary attack Which of the following remediation steps should be recommended? (Select THREE)

正解:B,C,D 解答を投票する
A recent vulnerability scan of all web servers in an environment offers the following results:

Taking a risk-based approach, which of the following is the BEST order to approach remediation based on exposure?

A manager calls upon a tester to assist with diagnosing an issue within the following Python script:
#!/usr/bin/python
s = "Administrator"
The tester suspects it is an issue with string slicing and manipulation Analyze the following code segment and drag and drop the correct output for each string manipulation to its corresponding code segment Options may be used once or not at all
正解:
A penetration tester discovers SNMP on some targets. Which of the following should the penetration tester try FIRST?

Which of the following describe a susceptibility present in Android-based commercial mobile devices when organizations are not employing MDM services? (Choose two.)

Which of the following excerpts would come from a corporate policy?

D18912E1457D5D1DDCBD40AB3BF70D5D
During the exploitation phase of a penetration test, a vulnerability is discovered that allows command execution on a Linux web server. A cursory review confirms the system access is only in a low-privilege user context: www-dat a. After reviewing, the following output from /etc/sudoers:

Which of the following users should be targeted for privilege escalation?

A client has scheduled a wireless penetration test. Which of the following describes the scoping target information MOST likely needed before testing can begin?

Which of the following reasons does penetration tester needs to have a customer's point-of -contact information available at all time? (Select THREE).

正解:D,E,G 解答を投票する
During a penetration test, a tester runs a phishing campaign and receives a shell from an internal PC running Windows 10 OS. The tester wants to perform credential harvesting with Mimikatz.
Which of the following registry changes would allow for credential caching in memory?

You are a penetration tester running port scans on a server.
INSTRUCTIONS
Part1: Given the output, construct the command that was used to generate this output from the available options.
Part2: Once the command is appropriately constructed, use the given output to identify the potential attack vectors that should be investigated further.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Part1

Part2
正解:
Part 1 - nmap 192.168.2.2 -sV -O
Part 2 - Weak SMB file permissions
Which of the following would be BEST for performing passive reconnaissance on a target's external domain?

An Internet-accessible database server was found with the following ports open: 22, 53, 110, 1433, and 3389. Which of the following would be the BEST hardening technique to secure the server?

Which of the following BEST explains why it is important to maintain confidentiality of any identified findings when performing a penetration test?

Which of the following is an important stakeholder to notify when penetration testing has begun?

Which of the following tools is used to perform a credential brute force attack?

解説: (GoShiken メンバーにのみ表示されます)