PT0-002 · Question #257
PT0-002 Question #257: Real Exam Question with Answer & Explanation
Sign in or unlock PT0-002 to reveal the answer and full explanation for question #257. The question stem and answer options stay visible for context.
Question
A penetration tester exploited a vulnerability on a server and remotely ran a payload to gain a shell. However, a connection was not established, and no errors were shown on the payload execution. The penetration tester suspected that a network device, like an IPS or next-generation firewall, was dropping the connection. Which of the following payloads are MOST likely to establish a shell successfully?
Options
- Awindows/x64/meterpreter/reverse_tcp
- Bwindows/x64/meterpreter/reverse_http
- Cwindows/x64/shell_reverse_tcp
- Dwindows/x64/powershell_reverse_tcp
- Ewindows/x64/meterpreter/reverse_https
Unlock PT0-002 to see the answer
You've previewed enough free PT0-002 questions. Unlock PT0-002 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.