ExamGecko
Home / CompTIA / PT0-003 / List of questions
Ask Question

CompTIA PT0-003 Practice Test - Questions Answers, Page 9

Add to Whishlist

List of questions

Question 81

Report Export Collapse

A penetration tester gains access to a Windows machine and wants to further enumerate users with native operating system credentials. Which of the following should the tester use?

Become a Premium Member for full access
  Unlock Premium Member

Question 82

Report Export Collapse

Which of the following is a term used to describe a situation in which a penetration tester bypasses physical access controls and gains access to a facility by entering at the same time as an employee?

Become a Premium Member for full access
  Unlock Premium Member

Question 83

Report Export Collapse

A penetration tester wants to check the security awareness of specific workers in the company with targeted attacks. Which of the following attacks should the penetration tester perform?

Become a Premium Member for full access
  Unlock Premium Member

Question 84

Report Export Collapse

A penetration tester wants to create a malicious QR code to assist with a physical security assessment. Which of the following tools has the built-in functionality most likely needed for this task?

Become a Premium Member for full access
  Unlock Premium Member

Question 85

Report Export Collapse

A penetration tester needs to help create a threat model of a custom application. Which of the following is the most likely framework the tester will use?

Become a Premium Member for full access
  Unlock Premium Member

Question 86

Report Export Collapse

During a penetration test, a tester attempts to pivot from one Windows 10 system to another Windows system. The penetration tester thinks a local firewall is blocking connections. Which of the following command-line utilities built into Windows is most likely to disable the firewall?

Become a Premium Member for full access
  Unlock Premium Member

Question 87

Report Export Collapse

A penetration tester is performing network reconnaissance. The tester wants to gather information about the network without causing detection mechanisms to flag the reconnaissance activities. Which of the following techniques should the tester use?

Become a Premium Member for full access
  Unlock Premium Member

Question 88

Report Export Collapse

A penetration tester established an initial compromise on a host. The tester wants to pivot to other targets and set up an appropriate relay. The tester needs to enumerate through the compromised host as a relay from the tester's machine. Which of the following commands should the tester use to do this task from the tester's host?

Become a Premium Member for full access
  Unlock Premium Member

Question 89

Report Export Collapse

A penetration tester needs to confirm the version number of a client's web application server. Which of the following techniques should the penetration tester use?

Become a Premium Member for full access
  Unlock Premium Member

Question 90

Report Export Collapse

While conducting a peer review for a recent assessment, a penetration tester finds the debugging mode is still enabled for the production system. Which of the following is most likely responsible for this observation?

Become a Premium Member for full access
  Unlock Premium Member
Total 240 questions
Go to page: of 24
Search

Related questions