nerdexam
CompTIACompTIA

PT0-003 · Question #7

PT0-003 Question #7: Real Exam Question with Answer & Explanation

The correct answer is B: Netcat. If a penetration tester gains access to a host but does not have a shell, the best tool for further enumeration is Netcat. Versatility: Netcat is known as the "Swiss Army knife" of networking tools. It can be used for port scanning, banner grabbing, and setting up reverse shells.

Submitted by satoshi_tk· Mar 6, 2026Network Security

Question

A penetration tester gains access to a host but does not have access to any type of shell. Which of the following is the best way for the tester to further enumerate the host and the environment in which it resides?

Options

  • AProxyChains
  • BNetcat
  • CPowerShell ISE
  • DProcess IDs

Explanation

If a penetration tester gains access to a host but does not have a shell, the best tool for further enumeration is Netcat. Versatility: Netcat is known as the "Swiss Army knife" of networking tools. It can be used for port scanning, banner grabbing, and setting up reverse shells. Enumeration: Without a shell, Netcat can help enumerate open ports and services running on the host, providing insight into the host's environment.

Topics

#Penetration testing#Post-exploitation#Enumeration tools#Netcat

Community Discussion

No community discussion yet for this question.

Full PT0-003 PracticeBrowse All PT0-003 Questions