Ready to Pass Your Certification Test

Ready to guarantee a pass on the certification that will elevate your career? Visit this page to explore our catalog and get the questions and answers you need to ace the test.

comptia PT1_002

Custom view settings

Exam contains 110 questions

Page 15 of 19
Question 85 🔥

In an unprotected network file repository, a penetration tester discovers a text file containing usernames and passwords in cleartext and a spreadsheet containing data for 50 employees, including full names, roles, and serial numbers. The tester realizes some of the passwords in the text file follow the format: <name- serial_number>. Which of the following would be the best action for the tester to take NEXT with this information?

Which database solution meets these requirements?
Highly voted
Discussion of the question
Question 86 🔥

Which of the following is the MOST effective person to validate results from a penetration test?

Which database solution meets these requirements?
Highly voted
Discussion of the question
Question 87 🔥

A penetration tester is working on a scoping document with a new client. The methodology the client uses includes the following:✑ Pre-engagement interaction (scoping and ROE)✑ Intelligence gathering (reconnaissance)✑ Threat modeling✑ Vulnerability analysis✑ Exploitation and post exploitation✑ ReportingWhich of the following methodologies does the client use?

Which database solution meets these requirements?
Highly voted
Discussion of the question
Question 88 🔥

A penetration tester ran an Nmap scan on an Internet-facing network device with the `"F option and found a few open ports. To further enumerate, the tester ran another scan using the following command: nmap `"O `"A `"sS `"p- 100.100.100.50Nmap returned that all 65,535 ports were filtered. Which of the following MOST likely occurred on the second scan?

Which database solution meets these requirements?
Highly voted
Discussion of the question
Question 89 🔥

A penetration tester exploited a unique flaw on a recent penetration test of a bank. After the test was completed, the tester posted information about the exploit online along with the IP addresses of the exploited machines. Which of the following documents could hold the penetration tester accountable for this action?

Which database solution meets these requirements?
Highly voted
Discussion of the question
Question 90 🔥

A client has requested that the penetration test scan include the following UDP services: SNMP, NetBIOS, and DNS. Which of the following Nmap commands will perform the scan?

Which database solution meets these requirements?
Highly voted
Discussion of the question

Lorem ipsum dolor sit amet consectetur. Eget sed turpis aenean sit aenean. Integer at nam ullamcorper a.

© 2024 Exam Prepare, Inc. All Rights Reserved.
PT1_002 questions • Exam prepare