Exam Name: | CompTIA PenTest+ Certification Exam | ||
Exam Code: | PT0-002 Dumps | ||
Vendor: | CompTIA | Certification: | PenTest+ |
Questions: | 445 Q&A's | Shared By: | omer |
A penetration tester was able to compromise a web server and move laterally into a Linux web server. The tester now wants to determine the identity of the last user who signed in to the web server. Which of the following log files will show this activity?
A penetration tester is conducting an engagement against an internet-facing web application and planning a phishing campaign. Which of the following is the BEST passive method of obtaining the technical contacts for the website?
Which of the following can be used to store alphanumeric data that can be fed into scripts or programs as input to penetration-testing tools?
An exploit developer is coding a script that submits a very large number of small requests to a web server until the server is compromised. The script must examine each response received and compare the data to a large number of strings to determine which data to submit next. Which of the following data structures should the exploit developer use to make the string comparison and determination as efficient as possible?