Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

PT0-002 CompTIA PenTest+ Certification Exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

PT0-002 Practice Questions

CompTIA PenTest+ Certification Exam

Last Update 4 days ago
Total Questions : 464

Dive into our fully updated and stable PT0-002 practice test platform, featuring all the latest PenTest+ exam questions added this week. Our preparation tool is more than just a CompTIA study aid; it's a strategic advantage.

Our free PenTest+ practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about PT0-002. Use this test to pinpoint which areas you need to focus your study on.

PT0-002 PDF

PT0-002 PDF (Printable)
$43.75
$124.99

PT0-002 Testing Engine

PT0-002 PDF (Printable)
$50.75
$144.99

PT0-002 PDF + Testing Engine

PT0-002 PDF (Printable)
$63.7
$181.99
Question # 51

A penetration tester wants to find hidden information in documents available on the web at a particular domain. Which of the following should the penetration tester use?

Options:

A.  

Netcraft

B.  

CentralOps

C.  

Responder

D.  

FOCA

Discussion 0
Question # 52

During a penetration tester found a web component with no authentication requirements. The web component also allows file uploads and is hosted on one of the target public web the following actions should the penetration tester perform next?

Options:

A.  

Continue the assessment and mark the finding as critical.

B.  

Attempting to remediate the issue temporally.

C.  

Notify the primary contact immediately.

D.  

Shutting down the web server until the assessment is finished

Discussion 0
Question # 53

A physical penetration tester needs to get inside an organization's office and collect sensitive information without acting suspiciously or being noticed by the security guards. The tester has observed that the company's ticket gate does not scan the badges, and employees leave their badges on the table while going to the restroom. Which of the following techniques can the tester use to gain physical access to the office? (Choose two.)

Options:

A.  

Shoulder surfing

B.  

Call spoofing

C.  

Badge stealing

D.  

Tailgating

E.  

Dumpster diving

F.  

Email phishing

Discussion 0
Question # 54

A penetration tester is conducting a penetration test. The tester obtains a root-level shell on a Linux server and discovers the following data in a file named password.txt in the /home/svsacct directory:

U3VQZXIkM2NyZXQhCg==

Which of the following commands should the tester use NEXT to decode the contents of the file?

Options:

A.  

echo U3VQZXIkM2NyZXQhCg== | base64 ג€"d

B.  

tar zxvf password.txt

C.  

hydra ג€"l svsacct ג€"p U3VQZXIkM2NyZXQhCg== ssh://192.168.1.0/24

D.  

john --wordlist /usr/share/seclists/rockyou.txt password.txt

Discussion 0
Question # 55

A security firm is discussing the results of a penetration test with the client. Based on the findings, the client wants to focus the remaining time on a critical network segment. Which of the following BEST describes the action taking place?

Options:

A.  

Maximizing the likelihood of finding vulnerabilities

B.  

Reprioritizing the goals/objectives

C.  

Eliminating the potential for false positives

D.  

Reducing the risk to the client environment

Discussion 0
Question # 56

A penetration-testing team needs to test the security of electronic records in a company's office. Per the terms of engagement, the penetration test is to be conducted after hours and should not include circumventing the alarm or performing destructive entry. During outside reconnaissance, the team sees an open door from an adjoining building. Which of the following would be allowed under the terms of the engagement?

Options:

A.  

Prying the lock open on the records room

B.  

Climbing in an open window of the adjoining building

C.  

Presenting a false employee ID to the night guard

D.  

Obstructing the motion sensors in the hallway of the records room

Discussion 0
Question # 57

A penetration tester will be performing a vulnerability scan as part of the penetration test on a client's website. The tester plans to run several Nmap scripts that probe for vulnerabilities while avoiding detection. Which of the following Nmap options will the penetration tester MOST likely utilize?

Options:

A.  

-а8 -T0

B.  

--script "http*vuln*"

C.  

-sn

D.  

-O -A

Discussion 0
Question # 58

A penetration tester finds a PHP script used by a web application in an unprotected internal source code repository. After reviewing the code, the tester identifies the following:

Question # 58

Which of the following combinations of tools would the penetration tester use to exploit this script?

Options:

A.  

Hydra and crunch

B.  

Netcat and cURL

C.  

Burp Suite and DIRB

D.  

Nmap and OWASP ZAP

Discussion 0
Question # 59

After running the enum4linux.pl command, a penetration tester received the following output:

Question # 59

Which of the following commands should the penetration tester run NEXT?

Options:

A.  

smbspool //192.160.100.56/print$

B.  

net rpc share -S 192.168.100.56 -U ''

C.  

smbget //192.168.100.56/web -U ''

D.  

smbclient //192.168.100.56/web -U '' -N

Discussion 0
Question # 60

Which of the following is the most important to include in the scope of a wireless security assessment?

Options:

A.  

Frequencies

B.  

APs

C.  

SSIDs

D.  

Signal strengths

Discussion 0
Get PT0-002 dumps and pass your exam in 24 hours!

Free Exams Sample Questions