Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

PT0-002 CompTIA PenTest+ Certification Exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

PT0-002 Practice Questions

CompTIA PenTest+ Certification Exam

Last Update 4 days ago
Total Questions : 464

Dive into our fully updated and stable PT0-002 practice test platform, featuring all the latest PenTest+ exam questions added this week. Our preparation tool is more than just a CompTIA study aid; it's a strategic advantage.

Our free PenTest+ practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about PT0-002. Use this test to pinpoint which areas you need to focus your study on.

PT0-002 PDF

PT0-002 PDF (Printable)
$43.75
$124.99

PT0-002 Testing Engine

PT0-002 PDF (Printable)
$50.75
$144.99

PT0-002 PDF + Testing Engine

PT0-002 PDF (Printable)
$63.7
$181.99
Question # 71

A private investigation firm is requesting a penetration test to determine the likelihood that attackers can gain access to mobile devices and then exfiltrate data from those devices. Which of the following is a social-engineering method that, if successful, would MOST likely enable both objectives?

Options:

A.  

Send an SMS with a spoofed service number including a link to download a malicious application.

B.  

Exploit a vulnerability in the MDM and create a new account and device profile.

C.  

Perform vishing on the IT help desk to gather a list of approved device IMEIs for masquerading.

D.  

Infest a website that is often used by employees with malware targeted toward x86 architectures.

Discussion 0
Question # 72

A penetration tester needs to upload the results of a port scan to a centralized security tool. Which of the following commands would allow the tester to save the results in an interchangeable format?

Options:

A.  

nmap -iL results 192.168.0.10-100

B.  

nmap 192.168.0.10-100 -O > results

C.  

nmap -A 192.168.0.10-100 -oX results

D.  

nmap 192.168.0.10-100 | grep "results"

Discussion 0
Question # 73

Company.com has hired a penetration tester to conduct a phishing test. The tester wants to set up a fake log-in page and harvest credentials when target employees click on links in a phishing email. Which of the following commands would best help the tester determine which cloud email provider the log-in page needs to mimic?

Options:

A.  

dig company.com MX

B.  

whois company.com

C.  

cur1 www.company.com

D.  

dig company.com A

Discussion 0
Question # 74

Which of the following is a regulatory compliance standard that focuses on user privacy by implementing the right to be forgotten?

Options:

A.  

NIST SP 800-53

B.  

ISO 27001

C.  

GDPR

Discussion 0
Question # 75

A penetration tester needs to perform a vulnerability scan against a web server. Which of the following tools is the tester MOST likely to choose?

Options:

A.  

Nmap

B.  

Nikto

C.  

Cain and Abel

D.  

Ethercap

Discussion 0
Question # 76

A penetration tester writes the following script:

Question # 76

Which of the following is the tester performing?

Options:

A.  

Searching for service vulnerabilities

B.  

Trying to recover a lost bind shell

C.  

Building a reverse shell listening on specified ports

D.  

Scanning a network for specific open ports

Discussion 0
Question # 77

A penetration tester learned that when users request password resets, help desk analysts change users' passwords to 123change. The penetration tester decides to brute force an internet-facing webmail to check which users are still using the temporary password. The tester configures the brute-force tool to test usernames found on a text file and the... Which of the following techniques is the penetration tester using?

Options:

A.  

Password brute force attack

B.  

SQL injection

C.  

Password spraying

D.  

Kerberoasting

Discussion 0
Question # 78

SIMULATION

Using the output, identify potential attack vectors that should be further investigated.

Question # 78

Question # 78

Question # 78

Question # 78

Question # 78

Options:

Discussion 0
Question # 79

A penetration tester is cleaning up and covering tracks at the conclusion of a penetration test. Which of the following should the tester be sure to remove from the system? (Choose two.)

Options:

A.  

Spawned shells

B.  

Created user accounts

C.  

Server logs

D.  

Administrator accounts

E.  

Reboot system

F.  

ARP cache

Discussion 0
Question # 80

A penetration tester has prepared the following phishing email for an upcoming penetration test:

Question # 80

Which of the following is the penetration tester using MOST to influence phishing targets to click on the link?

Options:

A.  

Familiarity and likeness

B.  

Authority and urgency

C.  

Scarcity and fear

D.  

Social proof and greed

Discussion 0
Get PT0-002 dumps and pass your exam in 24 hours!

Free Exams Sample Questions