Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

PT0-002 CompTIA PenTest+ Certification Exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

PT0-002 Practice Questions

CompTIA PenTest+ Certification Exam

Last Update 4 days ago
Total Questions : 464

Dive into our fully updated and stable PT0-002 practice test platform, featuring all the latest PenTest+ exam questions added this week. Our preparation tool is more than just a CompTIA study aid; it's a strategic advantage.

Our free PenTest+ practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about PT0-002. Use this test to pinpoint which areas you need to focus your study on.

PT0-002 PDF

PT0-002 PDF (Printable)
$43.75
$124.99

PT0-002 Testing Engine

PT0-002 PDF (Printable)
$50.75
$144.99

PT0-002 PDF + Testing Engine

PT0-002 PDF (Printable)
$63.7
$181.99
Question # 81

A software company has hired a security consultant to assess the security of the company's software development practices. The consultant opts to begin reconnaissance by performing fuzzing on a software binary. Which of the following vulnerabilities is the security consultant MOST likely to identify?

Options:

A.  

Weak authentication schemes

B.  

Credentials stored in strings

C.  

Buffer overflows

D.  

Non-optimized resource management

Discussion 0
Question # 82

Given the following script:

while True:

print ("Hello World")

Which of the following describes True?

Options:

A.  

A while loop

B.  

A conditional

C.  

A Boolean operator

D.  

An arithmetic operator

Discussion 0
Question # 83

A penetration tester is conducting an assessment against a group of publicly available web servers and notices a number of TCP resets returning from one of the web servers. Which of the following is MOST likely causing the TCP resets to occur during the assessment?

Options:

A.  

The web server is using a WA

F.  

B.  

The web server is behind a load balancer.

C.  

The web server is redirecting the requests.

D.  

The local antivirus on the web server Is rejecting the connection.

Discussion 0
Question # 84

A security firm has been hired to perform an external penetration test against a company. The only information the firm received was the company name. Which of the following passive reconnaissance approaches would be MOST likely to yield positive initial results?

Options:

A.  

Specially craft and deploy phishing emails to key company leaders.

B.  

Run a vulnerability scan against the company's external website.

C.  

Runtime the company's vendor/supply chain.

D.  

Scrape web presences and social-networking sites.

Discussion 0
Question # 85

Which of the following types of assessments MOST likely focuses on vulnerabilities with the objective to access specific data?

Options:

A.  

An unknown-environment assessment

B.  

A known-environment assessment

C.  

A red-team assessment

D.  

A compliance-based assessment

Discussion 0
Question # 86

During an assessment, a penetration tester gathered OSINT for one of the IT systems administrators from the target company and managed to obtain valuable information, including corporate email addresses. Which of the following techniques should the penetration tester perform NEXT?

Options:

A.  

Badge cloning

B.  

Watering-hole attack

C.  

Impersonation

D.  

Spear phishing

Discussion 0
Question # 87

ion tester is attempting to get more people from a target company to download and run an executable. Which of the following would be the.. :tive way for the tester to achieve this objective?

Options:

A.  

Dropping USB flash drives around the company campus with the file on it

B.  

Attaching the file in a phishing SMS that warns users to execute the file or they will be locked out of their accounts

C.  

Sending a pretext email from the IT department before sending the download instructions later

D.  

Saving the file in a common folder with a name that encourages people to click it

Discussion 0
Question # 88

An Nmap scan of a network switch reveals the following:

Question # 88

Which of the following technical controls will most likely be the FIRST recommendation for this device?

Options:

A.  

Encrypted passwords

B.  

System-hardening techniques

C.  

Multifactor authentication

D.  

Network segmentation

Discussion 0
Question # 89

An organization's Chief Information Security Officer debates the validity of a critical finding from a penetration assessment that was completed six months ago. Which of the following post-report delivery activities would have most likely prevented this scenario?

Options:

A.  

Client acceptance

B.  

Data destruction process

C.  

Attestation of findings

D.  

Lessons learned

Discussion 0
Question # 90

A penetration tester has been hired to examine a website for flaws. During one of the time windows for testing, a network engineer notices a flood of GET requests to the web server, reducing the website’s response time by 80%. The network engineer contacts the penetration tester to determine if these GET requests are part of the test. Which of the following BEST describes the purpose of checking with the penetration tester?

Options:

A.  

Situational awareness

B.  

Rescheduling

C.  

DDoS defense

D.  

Deconfliction

Discussion 0
Get PT0-002 dumps and pass your exam in 24 hours!

Free Exams Sample Questions