Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

PT0-002 CompTIA PenTest+ Certification Exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

PT0-002 Practice Questions

CompTIA PenTest+ Certification Exam

Last Update 4 days ago
Total Questions : 464

Dive into our fully updated and stable PT0-002 practice test platform, featuring all the latest PenTest+ exam questions added this week. Our preparation tool is more than just a CompTIA study aid; it's a strategic advantage.

Our free PenTest+ practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about PT0-002. Use this test to pinpoint which areas you need to focus your study on.

PT0-002 PDF

PT0-002 PDF (Printable)
$43.75
$124.99

PT0-002 Testing Engine

PT0-002 PDF (Printable)
$50.75
$144.99

PT0-002 PDF + Testing Engine

PT0-002 PDF (Printable)
$63.7
$181.99
Question # 91

Options:

A.  

Configure to stop broadcasting the SSID

B.  

Using directional antennas

C.  

Using WEP encryption

D.  

Disabling Wi-Fi

Discussion 0
Question # 92

A penetration tester was hired to test Wi-Fi equipment. Which of the following tools should be used to gather information about the wireless network?

Options:

A.  

Kismet

B.  

Burp Suite

C.  

BeEF

D.  

WHOIS

Discussion 0
Question # 93

bash

Copy code

for ip in $(seq 1 254);

do echo $(echo "192.168.15.$ip ") $(host 192.168.15.$ip dns.company.com | grep "domain name pointer")

done | grep "domain name pointer" | cut -d" " -f1,6

Which of the following best explains the purpose of this script?

Options:

A.  

To query the DNS for IP addresses and corresponding hostnames in a subnet

B.  

To output a list of all IP addresses in a subnet for later scanning

C.  

To ping every IP address in a subnet to discover live hosts

D.  

To search for DNS servers among the IP addresses in a subnet

Discussion 0
Question # 94

A company developed a new web application to allow its customers to submit loan applications. A penetration tester is reviewing the application and discovers that the application was developed in ASP and used MSSQL for its back-end database. Using the application's search form, the penetration tester inputs the following code in the search input field:

IMG SRC=vbscript:msgbox ("Vulnerable_to_Attack") ; >originalAttribute="SRC"originalPath="vbscript;msgbox ("Vulnerable_to_Attack ") ;>"

When the tester checks the submit button on the search form, the web browser returns a pop-up windows that displays "Vulnerable_to_Attack." Which of the following vulnerabilities did the tester discover in the web application?

Options:

A.  

SQL injection

B.  

Command injection

C.  

Cross-site request forgery

D.  

Cross-site scripting

Discussion 0
Question # 95

A penetration tester runs the following command:

nmap -p- -A 10.0.1.10

Given the execution of this command, which of the following quantities of ports will Nmap scan?

Options:

A.  

1,000

B.  

1,024

C.  

10,000

D.  

65,535

Discussion 0
Question # 96

A penetration tester enters a command into the shell and receives the following output:

C:\Users\UserX\Desktop>vmic service get name, pathname, displayname, startmode | findstr /i auto | findstr /i /v |C:\\Windows\\" I findstr /i /v""

VulnerableService Some Vulnerable Service C:\Program Files\A Subfolder\B Subfolder\SomeExecutable.exe Automatic

Which of the following types of vulnerabilities does this system contain?

Options:

A.  

Unquoted service path

B.  

Writable services

C.  

Clear text credentials

D.  

Insecure file/folder permissions

Discussion 0
Question # 97

A penetration testing firm performs an assessment every six months for the same customer. While performing network scanning for the latest assessment, the penetration tester observes that several of the target hosts appear to be residential connections associated with a major television and ISP in the area. Which of the following is the most likely reason for the observation?

Options:

A.  

The penetration tester misconfigured the network scanner.

B.  

The network scanning tooling is not functioning properly.

C.  

The IP ranges changed ownership.

D.  

The network scanning activity is being blocked by a firewall.

Discussion 0
Question # 98

Which of the following describes a globally accessible knowledge base of adversary tactics and techniques based on real-world observations?

Options:

A.  

OWASP Top 10

B.  

MITRE ATT&CK

C.  

Cyber Kill Chain

D.  

Well-Architected Framework

Discussion 0
Question # 99

Which of the following documents would be the most helpful in determining who is at fault for a temporary outage that occurred during a penetration test?

Options:

A.  

Non-disclosure agreement

B.  

Business associate agreement

C.  

Assessment scope and methodologies

D.  

Executive summary

Discussion 0
Question # 100

A penetration tester is performing DNS reconnaissance and has obtained the following output using different dig comrr

;; ANSWER SECTION

company.com.5INMX10 mxa.company.com

company.com.5IN-MX10 mxb.company.com

company.com.5INMX100 mxc.company.com

;; ANSWER SECTION company.com.5INA120.73.220.53

;; ANSWER SECTION company.com.5INNSnsl.nsvr.com

Which of the following can be concluded from the output the penetration tester obtained?

Options:

A.  

mxc.company.com is the preferred mail server.

B.  

The company.com record can be cached for five minutes.

C.  

The company's website is hosted at 120.73.220.53.

D.  

The nameservers are not redundant.

Discussion 0
Get PT0-002 dumps and pass your exam in 24 hours!

Free Exams Sample Questions