Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

PT0-002 CompTIA PenTest+ Certification Exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

PT0-002 Practice Questions

CompTIA PenTest+ Certification Exam

Last Update 4 days ago
Total Questions : 464

Dive into our fully updated and stable PT0-002 practice test platform, featuring all the latest PenTest+ exam questions added this week. Our preparation tool is more than just a CompTIA study aid; it's a strategic advantage.

Our free PenTest+ practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about PT0-002. Use this test to pinpoint which areas you need to focus your study on.

PT0-002 PDF

PT0-002 PDF (Printable)
$43.75
$124.99

PT0-002 Testing Engine

PT0-002 PDF (Printable)
$50.75
$144.99

PT0-002 PDF + Testing Engine

PT0-002 PDF (Printable)
$63.7
$181.99
Question # 61

A penetration tester joins the assessment team in the middle of the assessment. The client has asked the team, both verbally and in the scoping document, not to test the production networks. However, the new tester is not aware of this request and proceeds to perform exploits in the production environment. Which of the following would have MOST effectively prevented this misunderstanding?

Options:

A.  

Prohibiting exploitation in the production environment

B.  

Requiring all testers to review the scoping document carefully

C.  

Never assessing the production networks

D.  

Prohibiting testers from joining the team during the assessment

Discussion 0
Question # 62

A penetration tester is conducting an unknown environment test and gathering additional information that can be used for later stages of an assessment. Which of the following would most likely produce useful information for additional testing?

Options:

A.  

Searching for code repositories associated with a developer who previously worked for the target company code repositories associated with the

B.  

Searching for code repositories target company's organization

C.  

Searching for code repositories associated with the target company's organization

D.  

Searching for code repositories associated with a developer who previously worked for the target company

Discussion 0
Question # 63

A penetration tester is conducting an authorized, physical penetration test to attempt to enter a client's building during non-business hours. Which of the following are MOST important for the penetration tester to have during the test? (Choose two.)

Options:

A.  

A handheld RF spectrum analyzer

B.  

A mask and personal protective equipment

C.  

Caution tape for marking off insecure areas

D.  

A dedicated point of contact at the client

E.  

The paperwork documenting the engagement

F.  

Knowledge of the building's normal business hours

Discussion 0
Question # 64

The provision that defines the level of responsibility between the penetration tester and the client for preventing unauthorized disclosure is found in the:

Options:

A.  

NDA

B.  

SLA

C.  

MSA

D.  

SOW

Discussion 0
Question # 65

In Python socket programming, SOCK_DGRAM type is:

Options:

A.  

reliable.

B.  

matrixed.

C.  

connectionless.

D.  

slower.

Discussion 0
Question # 66

A penetration tester breaks into a company's office building and discovers the company does not have a shredding service. Which of the following attacks should the penetration tester try next?

Options:

A.  

Dumpster diving

B.  

Phishing

C.  

Shoulder surfing

D.  

Tailgating

Discussion 0
Question # 67

Which of the following tools would be BEST suited to perform a manual web application security assessment? (Choose two.)

Options:

A.  

OWASP ZAP

B.  

Nmap

C.  

Nessus

D.  

BeEF

E.  

Hydra

F.  

Burp Suite

Discussion 0
Question # 68

Which of the following can be used to store alphanumeric data that can be fed into scripts or programs as input to penetration-testing tools?

Options:

A.  

Dictionary

B.  

Directory

C.  

Symlink

D.  

Catalog

E.  

For-loop

Discussion 0
Question # 69

A penetration tester exploited a vulnerability on a server and remotely ran a payload to gain a shell. However, a connection was not established, and no errors were shown on the payload execution. The penetration tester suspected that a network device, like an IPS or next-generation firewall, was dropping the connection. Which of the following payloads are MOST likely to establish a shell successfully?

Options:

A.  

windows/x64/meterpreter/reverse_tcp

B.  

windows/x64/meterpreter/reverse_http

C.  

windows/x64/shell_reverse_tcp

D.  

windows/x64/powershell_reverse_tcp

E.  

windows/x64/meterpreter/reverse_https

Discussion 0
Question # 70

Given the following script:

Question # 70

Which of the following BEST characterizes the function performed by lines 5 and 6?

Options:

A.  

Retrieves the start-of-authority information for the zone on DNS server 10.10.10.10

B.  

Performs a single DNS query for www.comptia.org and prints the raw data output

C.  

Loops through variable b to count the results returned for the DNS query and prints that count to screen

D.  

Prints each DNS query result already stored in variable b

Discussion 0
Get PT0-002 dumps and pass your exam in 24 hours!

Free Exams Sample Questions