100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D484 Penetration Testing from CompTIA PenTest+ practice exam questions and answers Western Governors University

Rating
-
Sold
-
Pages
15
Grade
A+
Uploaded on
21-06-2024
Written in
2023/2024

WGU D484 Penetration Testing from CompTIA PenTest+ practice exam questions and answers Western Governors University Check PT0-001 CompTIA PenTest+ Free Dumps Online Congratulations – You have completed PT0-001 V9 exam! Your answers are shown below: 6. A constant wants to scan all the TCP Pots on an identified device. Which of the following Nmap switches will complete this task? ▪ -p- ▪ -p ALX, ▪ -p 1-65534 ▪ -port 1-65534 7. A security consultant is trying to attack a device with a previously identified user account. Which of the following types of attacks is being executed? ▪ Credential dump attack ▪ DLL injection attack ▪ Reverse shell attack ▪ Pass the hash attack 8. The following command is run on a Linux file system: Chmod 4111 /usr/bin/sudo Which of the following issues may be exploited now? ▪ Kernel vulnerabilities ▪ Sticky bits ▪ Unquoted service path ▪ Misconfigured sudo 9. A client is asking a penetration tester to evaluate a new web application for availability. Which of the following types of attacks should the tester use? ▪ TCP SYN flood ▪ SQL injection ▪ xss ▪ XMAS scan 10. During a penetration test, a tester runs a phishing campaign and receives a shell from an internal PC running Windows 10 OS. The tester wants to perform credential harvesting with Mimikatz. Which of the following registry changes would allow for credential caching in memory? ▪ reg add HKLMSystemControlSet002ControlSecurityProvidersWDigest /v userLogoCredential /t REG_DWORD /d 0 ▪ reg add HKCUSystemCurrentControlSetControlSecurityProvidersWDigest /v userLogoCredential /t REG_DWORD /d 1 ▪ reg add HKLMSoftwareCurrentControlSetControlSecurityProvidersWDigest /v userLogoCredential /t REG_DWORD /d 1 ▪ reg add HKLMSystemCurrentControlSetControlSecurityProvidersWDigest /v userLogoCredential /t REG_DWORD /d 1 11. In which of the following components is an exploited vulnerability MOST likely to affect multiple running application containers at once? ▪ Common libraries ▪ Configuration files ▪ Sandbox escape ▪ ASLR bypass 12. Which of the following would be BEST for performing passive reconnaissance on a target’s external domain?

Show more Read less









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
June 21, 2024
Number of pages
15
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
smartzone Liberty University
View profile
Follow You need to be logged in order to follow users or courses
Sold
3195
Member since
5 year
Number of followers
2291
Documents
14371
Last sold
18 hours ago
AMAIZING EDUCATION WORLD

GET ALL KIND OF EXAMS ON THIS PAGE ,COMPLETE TEST BANKS,SUMMARIES,STUDY GUIDES,PROJECT PAPERS,ASSIGNMENTS,CASE STUDIES, YOU CAN ALSO COMMUNICATE WITH THE SELLER FOR ANY PRE-ORDER,ORDER AND ETC.

3.7

584 reviews

5
260
4
93
3
103
2
29
1
99

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions