Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam PT0-002 Topic 4 Question 59 Discussion

Actual exam question for CompTIA's PT0-002 exam
Question #: 59
Topic #: 4
[All PT0-002 Questions]

Which of the following tools would help a penetration tester locate a file that was uploaded to a content management system?

Show Suggested Answer Hide Answer
Suggested Answer: A

The taskkill command is used in Windows to terminate tasks by process ID (PID) or image name (IM). The correct command to terminate a specified process and any child processes which were started by it uses the /T flag, and the /F flag is used to force terminate the process. Therefore, taskkill /PID <PID> /T /F is the correct syntax to terminate the endpoint protection software and its child processes.

The other options listed are either incorrect syntax or do not accomplish the task of terminating the child processes:

* /IM specifies the image name but is not necessary when using /PID.

* /S specifies the remote system to connect to and /U specifies the user context under which the command should execute, neither of which are relevant to terminating processes.

* There is no /P flag in the taskkill command.


Contribute your Thoughts:

Nadine
1 months ago
If I was a content management system, I would hide the uploaded files deep underground, just to see if the pen testers could find them. DirBuster to the rescue!
upvoted 0 times
Wilda
2 days ago
User 3: I agree, DirBuster can help locate hidden files.
upvoted 0 times
...
Weldon
10 days ago
User 2: Yeah, DirBuster is great for brute forcing directories.
upvoted 0 times
...
Delila
23 days ago
User 1: I think DirBuster would be the best tool for that.
upvoted 0 times
...
...
Arlean
1 months ago
I heard DirBuster is the 'treasure hunter' of the penetration testing world. Time to put on my Indiana Jones hat and go find that file!
upvoted 0 times
...
Kanisha
2 months ago
Scout Suite is a great tool for cloud security assessment, but it's not the right choice here. DirBuster is the way to go.
upvoted 0 times
Ramonita
6 days ago
Definitely, DirBuster is the way to go in this situation.
upvoted 0 times
...
Wenona
7 days ago
Scout Suite is good for cloud security, but not for this scenario.
upvoted 0 times
...
Matthew
10 days ago
I agree, DirBuster is specifically designed for that task.
upvoted 0 times
...
Celeste
23 days ago
Scout Suite is good for cloud security, but not for this scenario.
upvoted 0 times
...
Simona
28 days ago
I agree, DirBuster is specifically designed for that task.
upvoted 0 times
...
Viola
28 days ago
I think DirBuster would be the best tool for locating the uploaded file.
upvoted 0 times
...
Crista
1 months ago
I think DirBuster would be the best tool for locating the uploaded file.
upvoted 0 times
...
...
Bettyann
2 months ago
CeWL is a useful tool for creating cusHubert wordlists, but it's not really designed for finding uploaded files. I'd stick with DirBuster.
upvoted 0 times
Lajuana
1 months ago
I agree, DirBuster is a great tool for that.
upvoted 0 times
...
Serina
1 months ago
DirBuster would be the best choice for locating uploaded files.
upvoted 0 times
...
...
Hubert
2 months ago
Open VAS is a great vulnerability scanner, but I don't think it would be the best tool for this specific task. I'd go with DirBuster.
upvoted 0 times
...
Jill
2 months ago
Why do you think Scout Suite is the right answer?
upvoted 0 times
...
Emily
2 months ago
I think DirBuster would be the best tool to locate that uploaded file. It can help you scan directories and uncover hidden files.
upvoted 0 times
...
Arlette
2 months ago
I disagree, I believe the answer is C) Scout Suite.
upvoted 0 times
...
Jill
2 months ago
I think the answer is A) DirBuster.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77