Free CompTIA PT0-003 Questions
-
-
Page: 1/27
Total 131 Questions
Question No 1
During a security assessment, a penetration tester gains access to an internal server and manipulates some data to hide its presence. Which of the following is the best way for the penetration tester to hide the activities performed?
Question No 2
A tester enumerated a firewall policy and now needs to stage and exfiltrate data captured from the engagement. Given the following firewall policy Action | SRC | DEST | - - Block | 192.168.10.0/24 1 - 65535 | 10.0.0.0/24 22 | TCP Allow | 0.0.0.0/0 1 - 65535 | 192.168.10.0/24443 | TCP Allow | 192.168.10.0/24 1 - 65535 | 0.0.0.0/0443 | TCP Block | . | . | * Which of the following commands should the tester try next?
Question No 3
Which of the following elements in a lock should be aligned to a specific level to allow the key cylinder to turn?
Question No 4
A penetration tester assesses an application allow list and has limited command - line access on the Windows system. Which of the following would give the penetration tester information that could aid in continuing the test?
Question No 5
A penetration tester wants to use multiple TTPs to assess the reactions (alerted, blocked, and others) by the client’s current security tools. The threat - modeling team indicates the TTPs in the list might affect their internal systems and servers. Which of the following actions would the tester most likely take?
-
Page: 1/27
Total 131 Questions
-