Sale!

PT0-001 CompTIA PenTest+ Certification

$25.00 $19.95

  • Passing Score: 800
  • Time Limit: 120 min
  • File Version: 3.3
  • Q&A: 128
  • Updated October 2020
Recommend this page

Description

Start your future with a Data Analysis Certificate.

Exam Demo

PT0-001 CompTIA PenTest+ Certification

QUESTION 1
DRAG DROP
Place each of the following passwords in order of complexity from least complex (1) to most complex (4), based on the character sets represented. Each
password may be used only once.

PT0-001-1

Correct Answer:

PT0-001-2

QUESTION 2
DRAG DROP
A manager calls upon a tester to assist with diagnosing an issue within the following Python script:
#!/usr/bin/python
s = “Administrator”
The tester suspects it is an issue with string slicing and manipulation. Analyze the following code segment and drag and drop the correct output for each
string manipulation to its corresponding code segment. Options may be used once or not at all.
Select and Place:

PT0-001-3

Correct Answer:

PT0-001-4

QUESTION 3
A penetration tester has compromised a Windows server and is attempting to achieve persistence. Which of the following would achieve that goal?
A. schtasks.exe /create/tr “powershell.exe” Sv.ps1 /run
B. net session server | dsquery -user | net use c$
C. powershell && set-executionpolicy unrestricted

D. reg save HKLM\System\CurrentControlSet\Services\Sv.reg

Correct Answer: D

QUESTION 4
A client has scheduled a wireless penetration test. Which of the following describes the scoping target information MOST likely needed before testing
can begin?
A. The physical location and network ESSIDs to be tested
B. The number of wireless devices owned by the client
C. The client’s preferred wireless access point vendor
D. The bands and frequencies used by the client’s devices

Correct Answer: D

QUESTION 5
Which of the following BEST describes some significant security weaknesses with an ICS, such as those used in electrical utility facilities, natural gas
facilities, dams, and nuclear facilities?
A. ICS vendors are slow to implement adequate security controls.
B. ICS staff are not adequately trained to perform basic duties.
C. There is a scarcity of replacement equipment for critical devices.
D. There is a lack of compliance for ICS facilities.

Correct Answer: B


Jump start your career with best machine learning introduction course

0/5 (0 Reviews)