nerdexam
CompTIACompTIA

PT0-002 · Question #257

PT0-002 Question #257: Real Exam Question with Answer & Explanation

Sign in or unlock PT0-002 to reveal the answer and full explanation for question #257. The question stem and answer options stay visible for context.

Attacks and Exploits

Question

A penetration tester exploited a vulnerability on a server and remotely ran a payload to gain a shell. However, a connection was not established, and no errors were shown on the payload execution. The penetration tester suspected that a network device, like an IPS or next-generation firewall, was dropping the connection. Which of the following payloads are MOST likely to establish a shell successfully?

Options

  • Awindows/x64/meterpreter/reverse_tcp
  • Bwindows/x64/meterpreter/reverse_http
  • Cwindows/x64/shell_reverse_tcp
  • Dwindows/x64/powershell_reverse_tcp
  • Ewindows/x64/meterpreter/reverse_https

Unlock PT0-002 to see the answer

You've previewed enough free PT0-002 questions. Unlock PT0-002 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#Reverse Shells#Payload Evasion#IPS Bypass#Next-Gen Firewalls
Full PT0-002 PracticeBrowse All PT0-002 Questions