Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

PT0-002 CompTIA PenTest+ Certification Exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

PT0-002 Practice Questions

CompTIA PenTest+ Certification Exam

Last Update 4 days ago
Total Questions : 464

Dive into our fully updated and stable PT0-002 practice test platform, featuring all the latest PenTest+ exam questions added this week. Our preparation tool is more than just a CompTIA study aid; it's a strategic advantage.

Our free PenTest+ practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about PT0-002. Use this test to pinpoint which areas you need to focus your study on.

PT0-002 PDF

PT0-002 PDF (Printable)
$43.75
$124.99

PT0-002 Testing Engine

PT0-002 PDF (Printable)
$50.75
$144.99

PT0-002 PDF + Testing Engine

PT0-002 PDF (Printable)
$63.7
$181.99
Question # 41

A penetration tester is working on a scoping document with a new client. The methodology the client uses includes the following:

    Pre-engagement interaction (scoping and ROE)

    Intelligence gathering (reconnaissance)

    Threat modeling

    Vulnerability analysis

    Exploitation and post exploitation

    Reporting

Which of the following methodologies does the client use?

Options:

A.  

OWASP Web Security Testing Guide

B.  

PTES technical guidelines

C.  

NIST SP 800-115

D.  

OSSTMM

Discussion 0
Question # 42

Which of the following protocols or technologies would provide in-transit confidentiality protection for emailing the final security assessment report?

Options:

A.  

S/MIME

B.  

FTPS

C.  

DNSSEC

D.  

AS2

Discussion 0
Question # 43

A penetration tester wants to perform reconnaissance without being detected. Which of the following activities have a MINIMAL chance of detection? (Choose two.)

Options:

A.  

Open-source research

B.  

A ping sweep

C.  

Traffic sniffing

D.  

Port knocking

E.  

A vulnerability scan

F.  

An Nmap scan

Discussion 0
Question # 44

Which of the following concepts defines the specific set of steps and approaches that are conducted during a penetration test?

Options:

A.  

Scope details

B.  

Findings

C.  

Methodology

D.  

Statement of work

Discussion 0
Question # 45

An exploit developer is coding a script that submits a very large number of small requests to a web server until the server is compromised. The script must examine each response received and compare the data to a large number of strings to determine which data to submit next. Which of the following data structures should the exploit developer use to make the string comparison and determination as efficient as possible?

Options:

A.  

A list

B.  

A tree

C.  

A dictionary

D.  

An array

Discussion 0
Question # 46

During an assessment, a penetration tester obtains a list of 30 email addresses by crawling the target company's website and then creates a list of possible usernames based on the email address format. Which of the following types of attacks would MOST likely be used to avoid account lockout?

Options:

A.  

Mask

B.  

Rainbow

C.  

Dictionary

D.  

Password spraying

Discussion 0
Question # 47

A penetration tester is able to use a command injection vulnerability in a web application to get a reverse shell on a system After running a few commands, the tester runs the following:

python -c 'import pty; pty.spawn("/bin/bash")'

Which of the following actions Is the penetration tester performing?

Options:

A.  

Privilege escalation

B.  

Upgrading the shell

C.  

Writing a script for persistence

D.  

Building a bind shell

Discussion 0
Question # 48

A penetration tester has gained access to the Chief Executive Officer's (CEO's) internal, corporate email. The next objective is to gain access to the network.

Which of the following methods will MOST likely work?

Options:

A.  

Try to obtain the private key used for S/MIME from the CEO's account.

B.  

Send an email from the CEO's account, requesting a new account.

C.  

Move laterally from the mail server to the domain controller.

D.  

Attempt to escalate privileges on the mail server to gain root access.

Discussion 0
Question # 49

Given the following code:

Question # 49

Which of the following data structures is systems?

Options:

A.  

A tuple

B.  

A tree

C.  

An array

D.  

A dictionary

Discussion 0
Question # 50

During the assessment of a client's cloud and on-premises environments, a penetration tester was able to gain ownership of a storage object within the cloud environment using the provided on-premises credentials. Which of the following best describes why the tester was able to gain access?

Options:

A.  

Federation misconfiguration of the container

B.  

Key mismanagement between the environments

C.  

laaS failure at the provider

D.  

Container listed in the public domain

Discussion 0
Get PT0-002 dumps and pass your exam in 24 hours!

Free Exams Sample Questions