exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 456 discussion

Actual exam question from CompTIA's PT0-002
Question #: 456
Topic #: 1
[All PT0-002 Questions]

A penetration tester runs the following command and obtains the output shown:



After preparing the penetration test report, the penetration tester runs the following commands:

rm -f 127.0.0.1.unshadow
rm -f .john/john.pot

Which of the following best explains why the penetration tester ran the last two commands?

  • A. To remove tester-created credentials
  • B. To update John's database of cracked hashes
  • C. To prevent john from recracking the same hashes
  • D. To delete hashes and any recovered passwords
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Snagggggin
3 months ago
Selected Answer: D
The file .unshadow is typically related to combining /etc/passwd and /etc/shadow files for cracking password hashes, while john.pot is the password hash file used by John the Ripper.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago