100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Pentest+ Exam 2025/2026 Exam Questions and Correct Answers | New Update

Rating
-
Sold
-
Pages
19
Grade
A+
Uploaded on
01-05-2025
Written in
2024/2025

Pentest+ Exam 2025/2026 Exam Questions and Correct Answers | New Update A penetration tester has compromised a Windows server and is attempting to achieve persistence. Which of the following would achieve that goal? - � �ANSWER reg save HKLMSystemCurrentControlSetServicesS A client has scheduled a wireless penetration test. Which of the following describes the scoping target information MOST likely needed before testing can begin? -

Show more Read less
Institution
Pentest+
Course
Pentest+










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Pentest+
Course
Pentest+

Document information

Uploaded on
May 1, 2025
Number of pages
19
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Pentest+ Exam 2025/2026 Exam
Questions and Correct Answers | New
Update



A penetration tester has compromised a Windows server and is attempting

to achieve persistence. Which of the following would achieve that goal? -

🧠ANSWER ✔✔reg save HKLM\System\CurrentControlSet\Services\Sv.reg


A client has scheduled a wireless penetration test. Which of the following

describes the scoping target information MOST likely needed before testing

can begin? - 🧠ANSWER ✔✔The bands and frequencies used by the client's

devices

Which of the following BEST describes some significant security

weaknesses with an ICS, such as those used in electrical utility facilities,

natural gas facilities, dams, and nuclear facilities? - 🧠ANSWER ✔✔ICS

staff are not adequately trained to perform basic duties.

A security analyst was provided with a detailed penetration report, which

was performed against the organization's DMZ environment. It was noted

on the report that a finding has a CVSS base score of 10.0. Which of the

1
COPYRIGHT©JOSHCLAY 2025/2026. YEAR PUBLISHED 2025. COMPANY REGISTRATION NUMBER: 619652435. TERMS OF USE. PRIVACY
STATEMENT. ALL RIGHTS RESERVED

,following levels of difficulty would be required to exploit this vulnerability? -

🧠ANSWER ✔✔Trivial; little effort is required to exploit this finding.


A penetration tester has gained access to a marketing employee's device.

The penetration tester wants to ensure that if the access is discovered,

control of the device can be regained. Which of the following actions should

the penetration tester use to maintain persistence to the device? (Select

TWO.) - 🧠ANSWER ✔✔Place an entry in

HKLM\Software\Microsoft\CurrentVersion\Run to call au57d.ps1.

Place a script in

C:\users\%username\local\appdata\roaming\temp\au57d.ps1.

Which of the following tools is used to perform a credential brute force

attack? - 🧠ANSWER ✔✔Hydra


Which of the following situations would cause a penetration tester to

communicate with a system owner/client during the course of a test?

(Select TWO.) - 🧠ANSWER ✔✔The system shows evidence of prior

unauthorized compromise.

The system becomes unavailable following an attempted exploit.




2
COPYRIGHT©JOSHCLAY 2025/2026. YEAR PUBLISHED 2025. COMPANY REGISTRATION NUMBER: 619652435. TERMS OF USE. PRIVACY
STATEMENT. ALL RIGHTS RESERVED

, A penetration tester has performed a security assessment for a startup

firm. The report lists a total of ten vulnerabilities, with five identified as

critical. The client does not have the resources to immediately remediate all

vulnerabilities. Under such circumstances, which of the following would be

the BEST suggestion for the client? - 🧠ANSWER ✔✔Fix the most critical

vulnerability first, even if it means fixing the other vulnerabilities may take a

very long lime.

Which of the following is the reason why a penetration tester would run the

chkconfig --del servicename command at the end of an engagement? -

🧠ANSWER ✔✔To remove the persistence


A penetration tester wants to target NETBIOS name service. Which of the

following is the MOST likely command to exploit the NETBIOS name

service? - 🧠ANSWER ✔✔nmap


A security consultant receives a document outlining the scope of an

upcoming penetration test. This document contains IP addresses and times

that each can be scanned. Which of the following would contain this

information? - 🧠ANSWER ✔✔Rules of engagement


A penetration tester executes the following commands:



3
COPYRIGHT©JOSHCLAY 2025/2026. YEAR PUBLISHED 2025. COMPANY REGISTRATION NUMBER: 619652435. TERMS OF USE. PRIVACY
STATEMENT. ALL RIGHTS RESERVED

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
JOSHCLAY West Governors University
View profile
Follow You need to be logged in order to follow users or courses
Sold
212
Member since
2 year
Number of followers
14
Documents
17198
Last sold
13 hours ago
JOSHCLAY

JOSHCLAY EXAM HUB, WELCOME ALL, HERE YOU WILL FIND ALL DOCUMENTS & PACKAGE DEAL YOU NEED FOR YOUR SCHOOL WORK OFFERED BY SELLER JOSHCLAY

3.6

42 reviews

5
16
4
7
3
9
2
5
1
5

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions