Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

PT0-002 CompTIA PenTest+ Certification Exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

PT0-002 Practice Questions

CompTIA PenTest+ Certification Exam

Last Update 4 days ago
Total Questions : 464

Dive into our fully updated and stable PT0-002 practice test platform, featuring all the latest PenTest+ exam questions added this week. Our preparation tool is more than just a CompTIA study aid; it's a strategic advantage.

Our free PenTest+ practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about PT0-002. Use this test to pinpoint which areas you need to focus your study on.

PT0-002 PDF

PT0-002 PDF (Printable)
$43.75
$124.99

PT0-002 Testing Engine

PT0-002 PDF (Printable)
$50.75
$144.99

PT0-002 PDF + Testing Engine

PT0-002 PDF (Printable)
$63.7
$181.99
Question # 11

In the process of active service enumeration, a penetration tester identifies an SMTP daemon running on one of the target company’s servers. Which of the following actions would BEST enable the tester to perform

phishing in a later stage of the assessment?

Options:

A.  

Test for RFC-defined protocol conformance.

B.  

Attempt to brute force authentication to the service.

C.  

Perform a reverse DNS query and match to the service banner.

D.  

Check for an open relay configuration.

Discussion 0
Question # 12

A security company has been contracted to perform a scoped insider-threat assessment to try to gain access to the human resources server that houses PII and salary data. The penetration testers have been given an internal network starting position.

Which of the following actions, if performed, would be ethical within the scope of the assessment?

Options:

A.  

Exploiting a configuration weakness in the SQL database

B.  

Intercepting outbound TLS traffic

C.  

Gaining access to hosts by injecting malware into the enterprise-wide update server

D.  

Leveraging a vulnerability on the internal CA to issue fraudulent client certificates

E.  

Establishing and maintaining persistence on the domain controller

Discussion 0
Question # 13

A new client hired a penetration-testing company for a month-long contract for various security assessments against the client’s new service. The client is expecting to make the new service publicly available shortly after the assessment is complete and is planning to fix any findings, except for critical issues, after the service is made public. The client wants a simple report structure and does not want to receive daily findings.

Which of the following is most important for the penetration tester to define FIRST?

Options:

A.  

Establish the format required by the client.

B.  

Establish the threshold of risk to escalate to the client immediately.

C.  

Establish the method of potential false positives.

D.  

Establish the preferred day of the week for reporting.

Discussion 0
Question # 14

A penetration tester is exploring a client’s website. The tester performs a curl command and obtains the following:

* Connected to 10.2.11.144 (::1) port 80 (#0)

> GET /readmine.html HTTP/1.1

> Host: 10.2.11.144

> User-Agent: curl/7.67.0

> Accept: */*

>

* Mark bundle as not supporting multiuse

< HTTP/1.1 200

< Date: Tue, 02 Feb 2021 21:46:47 GMT

< Server: Apache/2.4.41 (Debian)

< Content-Length: 317

< Content-Type: text/html; charset=iso-8859-1

<

WordPress › ReadMe

Which of the following tools would be BEST for the penetration tester to use to explore this site further?

Options:

A.  

Burp Suite

B.  

DirBuster

C.  

WPScan

D.  

OWASP ZAP

Discussion 0
Question # 15

A penetration tester has been given an assignment to attack a series of targets in the 192.168.1.0/24 range, triggering as few alarms and countermeasures as possible.

Which of the following Nmap scan syntaxes would BEST accomplish this objective?

Options:

A.  

nmap -sT -vvv -O 192.168.1.2/24 -PO

B.  

nmap -sV 192.168.1.2/24 -PO

C.  

nmap -sA -v -O 192.168.1.2/24

D.  

nmap -sS -O 192.168.1.2/24 -T1

Discussion 0
Question # 16

Which of the following is the MOST effective person to validate results from a penetration test?

Options:

A.  

Third party

B.  

Team leader

C.  

Chief Information Officer

D.  

Client

Discussion 0
Question # 17

A company that requires minimal disruption to its daily activities needs a penetration tester to perform information gathering around the company’s web presence. Which of the following would the tester find MOST helpful in the initial information-gathering steps? (Choose two.)

Options:

A.  

IP addresses and subdomains

B.  

Zone transfers

C.  

DNS forward and reverse lookups

D.  

Internet search engines

E.  

Externally facing open ports

F.  

Shodan results

Discussion 0
Question # 18

A penetration tester who is doing a company-requested assessment would like to send traffic to another system using double tagging. Which of the following techniques would BEST accomplish this goal?

Options:

A.  

RFID cloning

B.  

RFID tagging

C.  

Meta tagging

D.  

Tag nesting

Discussion 0
Question # 19

The attacking machine is on the same LAN segment as the target host during an internal penetration test. Which of the following commands will BEST enable the attacker to conduct host delivery and write the discovery to files without returning results of the attack machine?

Options:

A.  

nmap snn exclude 10.1.1.15 10.1.1.0/24 oA target_txt

B.  

nmap גiR10oX out.xml | grep גNmapג | cut d ג"f5 > live-hosts.txt

C.  

nmap גPnsV OiL target.txt גA target_text_Service

D.  

nmap גsSPn n iL target.txt גA target_txtl

Discussion 0
Question # 20

A penetration tester is explaining the MITRE ATT&CK framework to a company’s chief legal counsel.

Which of the following would the tester MOST likely describe as a benefit of the framework?

Options:

A.  

Understanding the tactics of a security intrusion can help disrupt them.

B.  

Scripts that are part of the framework can be imported directly into SIEM tools.

C.  

The methodology can be used to estimate the cost of an incident better.

D.  

The framework is static and ensures stability of a security program overtime.

Discussion 0
Get PT0-002 dumps and pass your exam in 24 hours!

Free Exams Sample Questions