Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

PT0-002 CompTIA PenTest+ Certification Exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

PT0-002 Practice Questions

CompTIA PenTest+ Certification Exam

Last Update 4 days ago
Total Questions : 464

Dive into our fully updated and stable PT0-002 practice test platform, featuring all the latest PenTest+ exam questions added this week. Our preparation tool is more than just a CompTIA study aid; it's a strategic advantage.

Our free PenTest+ practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about PT0-002. Use this test to pinpoint which areas you need to focus your study on.

PT0-002 PDF

PT0-002 PDF (Printable)
$43.75
$124.99

PT0-002 Testing Engine

PT0-002 PDF (Printable)
$50.75
$144.99

PT0-002 PDF + Testing Engine

PT0-002 PDF (Printable)
$63.7
$181.99
Question # 21

A penetration tester is examining a Class C network to identify active systems quickly. Which of the following commands should the penetration tester use?

Options:

A.  

nmap גsn 192.168.0.1/16

B.  

nmap גsn 192.168.0.1-254

C.  

nmap גsn 192.168.0.1 192.168.0.1.254

D.  

nmap גsN 192.168.0.0/24

Discussion 0
Question # 22

A penetration tester has been contracted to review wireless security. The tester has deployed a malicious wireless AP that mimics the configuration of the target enterprise WiFi. The penetration tester now wants to try to force nearby wireless stations to connect to the malicious AP. Which of the following steps should the tester take NEXT?

Options:

A.  

Send deauthentication frames to the stations.

B.  

Perform jamming on all 2.4GHz and 5GHz channels.

C.  

Set the malicious AP to broadcast within dynamic frequency selection channels.

D.  

Modify the malicious AP configuration to not use a pre-shared key.

Discussion 0
Question # 23

A penetration tester wants to validate the effectiveness of a DLP product by attempting exfiltration of data using email attachments. Which of the following techniques should the tester select to accomplish this task?

Options:

A.  

Steganography

B.  

Metadata removal

C.  

Encryption

D.  

Encode64

Discussion 0
Question # 24

A penetration tester is scanning a corporate lab network for potentially vulnerable services. Which of the following Nmap commands will return vulnerable ports that might be interesting to a potential attacker?

Options:

A.  

nmap192.168.1.1-5–PU22-25,80

B.  

nmap192.168.1.1-5–PA22-25,80

C.  

nmap192.168.1.1-5–PS22-25,80

D.  

nmap192.168.1.1-5–Ss22-25,80

Discussion 0
Question # 25

A penetration tester who is conducting a vulnerability assessment discovers that ICMP is disabled on a network segment. Which of the following could be used for a denial-of-service attack on the network segment?

Options:

A.  

Smurf

B.  

Ping flood

C.  

Fraggle

D.  

Ping of death

Discussion 0
Question # 26

The following line-numbered Python code snippet is being used in reconnaissance:

Question # 26

Which of the following line numbers from the script MOST likely contributed to the script triggering a “probable port scan” alert in the organization’s IDS?

Options:

A.  

Line 01

B.  

Line 02

C.  

Line 07

D.  

Line 08

Discussion 0
Question # 27

A tester who is performing a penetration test on a website receives the following output:

Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /var/www/search.php on line 62

Which of the following commands can be used to further attack the website?

Options:

A.  

B.  

../../../../../../../../../../etc/passwd

C.  

/var/www/html/index.php;whoami

D.  

1 UNION SELECT 1, DATABASE(),3--

Discussion 0
Question # 28

A penetration tester has completed an analysis of the various software products produced by the company under assessment. The tester found that over the past several years the company has been including vulnerable third-party modules in multiple products, even though the quality of the organic code being developed is very good. Which of the following recommendations should the penetration tester include in the report?

Options:

A.  

Add a dependency checker into the tool chain.

B.  

Perform routine static and dynamic analysis of committed code.

C.  

Validate API security settings before deployment.

D.  

Perform fuzz testing of compiled binaries.

Discussion 0
Question # 29

A penetration tester conducted a vulnerability scan against a client’s critical servers and found the following:

Question # 29

Which of the following would be a recommendation for remediation?

Options:

A.  

Deploy a user training program

B.  

Implement a patch management plan

C.  

Utilize the secure software development life cycle

D.  

Configure access controls on each of the servers

Discussion 0
Question # 30

A penetration tester conducted an assessment on a web server. The logs from this session show the following:

http://www.thecompanydomain.com/servicestatus.php?serviceID=892 &serviceID=892 ‘ ; DROP TABLE SERVICES; --

Which of the following attacks is being attempted?

Options:

A.  

Clickjacking

B.  

Session hijacking

C.  

Parameter pollution

D.  

Cookie hijacking

E.  

Cross-site scripting

Discussion 0
Get PT0-002 dumps and pass your exam in 24 hours!

Free Exams Sample Questions