{"id":56,"date":"2022-11-26T07:49:57","date_gmt":"2022-11-26T07:49:57","guid":{"rendered":"https:\/\/exampracticetests.com\/c\/PT0-002\/comptia-pentest-pt0-002-question048\/"},"modified":"2022-11-26T07:49:57","modified_gmt":"2022-11-26T07:49:57","slug":"comptia-pentest-pt0-002-question048","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/c\/PT0-002\/comptia-pentest-pt0-002-question048\/","title":{"rendered":"CompTIA PenTest+ PT0-002 &#8211; Question048"},"content":{"rendered":"<div class=\"question\">DRAG DROP<br \/>\nDuring a penetration test, you gain access to a system with a limited user interface. This machine appears to have access to an isolated network that you would like to port scan.<br \/>\nINSTRUCTIONS<br \/>\nAnalyze the code segments to determine which sections are needed to complete a port scanning script.<br \/>\nDrag the appropriate elements into the correct locations to complete the script.<br \/>\nIf at any time you would like to bring back the initial state of the simulation, please click the Reset All button.<br \/>\nSelect and Place:<br \/>\n<img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full\" src=\"https:\/\/exampracticetests.com\/c\/PT0-002\/wp-content\/uploads\/exam\/0048-0000.jpg\" \/><\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>See the explanation<\/strong><\/div>\n<p><strong>Explanation:<\/strong> <\/p>\n<div class=\"explanation\">\n<img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full\" src=\"https:\/\/exampracticetests.com\/c\/PT0-002\/wp-content\/uploads\/exam\/0048-0001.jpg\" \/><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>DRAG DROP During a penetration test, you gain access to a system with a limited user interface. This machine appears to have access to an isolated network that you would like to port scan. INSTRUCTIONS Analyze the code segments to determine which sections are needed to complete a port scanning script. Drag the appropriate elements [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,51],"class_list":["post-56","post","type-post","status-publish","format-standard","hentry","category-comptia-pentest-pt0-002","tag-comptia-pentest-pt0-002","tag-question-048"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/c\/PT0-002\/wp-json\/wp\/v2\/posts\/56","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/c\/PT0-002\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/c\/PT0-002\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/PT0-002\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/PT0-002\/wp-json\/wp\/v2\/comments?post=56"}],"version-history":[{"count":0,"href":"https:\/\/exampracticetests.com\/c\/PT0-002\/wp-json\/wp\/v2\/posts\/56\/revisions"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/c\/PT0-002\/wp-json\/wp\/v2\/media?parent=56"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/PT0-002\/wp-json\/wp\/v2\/categories?post=56"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/PT0-002\/wp-json\/wp\/v2\/tags?post=56"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}