CompTIA PenTest+ PT0-002 Practice Question

During a penetration test, you have obtained a low-privileged user shell on a Linux system. You want to perform privilege escalation to gain root access. Which of the following methods would be the most effective initial step in identifying potential vectors for vertical privilege escalation?

  • Brute-force the root account password using a tool like Hydra

  • Check currently running processes and services using commands like ps aux, top, or systemctl

  • Examine the /etc/passwd file for users with a UID of 0

  • Review all entries in the /etc/crontab for cron jobs that a user may be able to modify

CompTIA PenTest+ PT0-002
Attacks and Exploits
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot