CompTIA PT0-001 CompTIA PenTest+ Certification Exam Online Training
CompTIA PT0-001 Online Training
The questions for PT0-001 were last updated at Jan 03,2025.
- Exam Code: PT0-001
- Exam Name: CompTIA PenTest+ Certification Exam
- Certification Provider: CompTIA
- Latest update: Jan 03,2025
A penetration tester is exploiting the use of default public and private community strings.
Which of the following protocols is being exploited?
- A . SMTP
- B . DNS
- C . SNMP
- D . HTTP
A penetration tester is attempting to capture a handshake between a client and an access point by monitoring a WPA2-PSK secured wireless network. The tester is monitoring the correct channel for the identified network, but has been unsuccessful in capturing a handshake.
Given the scenario, which of the following attacks would BEST assist the tester in obtaining this handshake?
- A . Karma attack
- B . Deauthentication attack
- C . Fragmentation attack
- D . SSDI broadcast flood
A penetration tester has compromised a host .
Which of the following would be the correct syntax to create a Netcat listener on the device?
- A . nc -lvp 4444 /bin/bash
- B . nc -vp 4444 /bin/bash
- C . nc -p 4444 /bin/bash
- D . nc -lp 4444 Ce /bin/bash
A
Explanation:
Reference: https://netsec.ws/?p=292
Joe, a penetration tester, has received basic account credentials and logged into a Windows system.
To escalate his privilege, from which of the following places is he using Mimikatz to pull credentials?
- A . LSASS
- B . SAM database
- C . Active Directory
- D . Registry
A penetration tester locates a few unquoted service paths during an engagement .
Which of the following can the tester attempt to do with these?
- A . Attempt to crack the service account passwords.
- B . Attempt DLL hijacking attacks.
- C . Attempt to locate weak file and folder permissions.
- D . Attempt privilege escalation attacks.
A penetration tester, who is not on the client’s network. is using Nmap to scan the network for hosts that are in scope.
The penetration tester is not receiving any response on the command: nmap 100.100/1/0-125
Which of the following commands would be BEST to return results?
- A . nmap -Pn -sT 100.100.1.0-125
- B . nmap -sF -p 100.100.1.0-125
- C . nmap -sV -oA output 100.100.10-125
- D . nmap 100.100.1.0-125 -T4
A penetration tester executes the following commands:
C:>%userprofile%jtr.exe
This program has been blocked by group policy
C:> accesschk.exe -w -s -q -u Users C:Windows
rw C:WindowsTracing
C:>copy %userprofile%jtr.exe C:WindowsTracing
C:WindowsTracingjtr.exe
jtr version 3.2…
jtr>
Which of the following is a local host vulnerability that the attacker is exploiting?
- A . Insecure file permissions
- B . Application Whitelisting
- C . Shell escape
- D . Writable service
A
Explanation:
References https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/#john-the-ripper—jtr
Which of the following is an example of a spear phishing attack?
- A . Targeting an executive with an SMS attack
- B . Targeting a specific team with an email attack
- C . Targeting random users with a USB key drop
- D . Targeting an organization with a watering hole attack
B
Explanation:
Reference: https://www.comparitech.com/blog/information-security/spear-phishing/
An organization has requested that a penetration test be performed to determine if it is possible for an attacker to gain a foothold on the organization’s server segment During the assessment, the penetration tester identifies tools that appear to have been left behind by a prior attack.
Which of the following actions should the penetration tester take?
- A . Attempt to use the remnant tools to achieve persistence
- B . Document the presence of the left-behind tools in the report and proceed with the test
- C . Remove the tools from the affected systems before continuing on with the test
- D . Discontinue further testing and report the situation to management
A penetration tester is outside of an organization’s network and is attempting to redirect users to a fake password reset website hosted on the penetration tester’s box .
Which of the following techniques is suitable to attempt this?
- A . Employ NBNS poisoning.
- B . Perform ARP spoofing.
- C . Conduct a phishing campaign.
- D . Use an SSL downgrade attack.