CompTIA PT0-001 Exam Practice Questions (P. 2)
- Full Access (196 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #6
A security analyst was provided with a detailed penetration report, which was performed against the organization's DMZ environment. It was noted on the report that a finding has a CVSS base score of 10.0. Which of the following levels of difficulty would be required to exploit this vulnerability?
- AVery difficult; perimeter systems are usually behind a firewall.
- BSomewhat difficult; would require significant processing power to exploit.
- CTrivial; little effort is required to exploit this finding.Most Voted
- DImpossible; external hosts are hardened to protect against attacks.
Correct Answer:
C
Reference:
https://nvd.nist.gov/vuln-metrics/cvss
C
Reference:
https://nvd.nist.gov/vuln-metrics/cvss
send
light_mode
delete
Question #7
A penetration tester has gained access to a marketing employee's device. The penetration tester wants to ensure that if the access is discovered, control of the device can be regained. Which of the following actions should the penetration tester use to maintain persistence to the device? (Select TWO.)
- APlace an entry in HKLM\Software\Microsoft\CurrentVersion\Run to call au57d.ps1.Most Voted
- BPlace an entry in C:\windows\system32\drivers\etc\hosts for 12.17.20.10 badcomptia.com.
- CPlace a script in C:\users\%username\local\appdata\roaming\temp\au57d.ps1.
- DCreate a fake service in Windows called RTAudio to execute manually.
- EPlace an entry for RTAudio in HKLM\CurrentControlSet\Services\RTAudio.Most Voted
- FCreate a schedule task to call C:\windows\system32\drivers\etc\hosts.
Correct Answer:
AC
AC
send
light_mode
delete
Question #8
Which of the following tools is used to perform a credential brute force attack?
- AHydraMost Voted
- BJohn the Ripper
- CHashcat
- DPeach
Correct Answer:
A
Reference:
https://www.greycampus.com/blog/information-security/brute-force-attacks-prominent-tools-to-tackle-such-attacks
A
Reference:
https://www.greycampus.com/blog/information-security/brute-force-attacks-prominent-tools-to-tackle-such-attacks
send
light_mode
delete
Question #9
Which of the following situations would cause a penetration tester to communicate with a system owner/client during the course of a test? (Select TWO.)
- AThe tester discovers personally identifiable data on the system.
- BThe system shows evidence of prior unauthorized compromise.Most Voted
- CThe system shows a lack of hardening throughout.
- DThe system becomes unavailable following an attempted exploit.Most Voted
- EThe tester discovers a finding on an out-of-scope system.
Correct Answer:
BD
BD
send
light_mode
delete
Question #10
A penetration tester has performed a security assessment for a startup firm. The report lists a total of ten vulnerabilities, with five identified as critical. The client does not have the resources to immediately remediate all vulnerabilities. Under such circumstances, which of the following would be the BEST suggestion for the client?
- AApply easy compensating controls for critical vulnerabilities to minimize the risk, and then reprioritize remediation.
- BIdentify the issues that can be remediated most quickly and address them first.
- CImplement the least impactful of the critical vulnerabilities' remediations first, and then address other critical vulnerabilities
- DFix the most critical vulnerability first, even if it means fixing the other vulnerabilities may take a very long lime.Most Voted
Correct Answer:
D
D
send
light_mode
delete
All Pages