Free CompTIA PenTest+ Certification Exam PT0-002 Exam Practice Test
PT0-002 Exam Features
In Just $59 You can Access
- All Official Question Types
- Interactive Web-Based Practice Test Software
- No Installation or 3rd Party Software Required
- Customize your practice sessions (Free Demo)
- 24/7 Customer Support
Total Questions: 445
-
A Chief Information Security Officer wants a penetration tester to evaluate whether a recently installed firewall is protecting a subnetwork on which many decades- old legacy systems are connected. The penetration tester decides to run an OS discovery and a full port scan to identify all the systems and any potential vulnerability. Which of the following should the penetration tester consider BEFORE running a scan?
Answer: C Next Question -
Which of the following provides a matrix of common tactics and techniques used by attackers along with recommended mitigations?
Answer: C Next Question -
A penetration tester analyzed a web-application log file and discovered an input that was sent to the company's web application. The input contains a string that says 'WAITFOR.' Which of the following attacks is being attempted?
Answer: A Next Question -
A penetration tester successfully performed an exploit on a host and was able to hop from VLAN 100 to VLAN 200. VLAN 200 contains servers that perform financial transactions, and the penetration tester now wants the local interface of the attacker machine to have a static ARP entry in the local cache. The attacker machine has the following:IP Address: 192.168.1.63Physical Address: 60-36-dd-a6-c5-33Which of the following commands would the penetration tester MOST likely use in order to establish a static ARP entry successfully?
Answer: B Next Question -
Which of the following protocols or technologies would provide in-transit confidentiality protection for emailing the final security assessment report?
Answer: A Next Question -
During a web application test, a penetration tester was able to navigate to https://company.com and view all links on the web page. After manually reviewing the pages, the tester used a web scanner to automate the search for vulnerabilities. When returning to the web application, the following message appeared in the browser: unauthorized to view this page. Which of the following BEST explains what occurred?
Answer: B Next Question -
A penetration tester, who is doing an assessment, discovers an administrator has been exfiltrating proprietary company information. The administrator offers to pay the tester to keep quiet. Which of the following is the BEST action for the tester to take?
Answer: B Next Question -
Which of the following types of communication should a penetration tester provide a client to document test results for PCI DSS compliance?
Answer: C Next Question -
A penetration tester who is doing a company-requested assessment would like to send traffic to another system using double tagging. Which of the following techniques would BEST accomplish this goal?
Answer: D Next Question -
A penetration tester discovers passwords in a publicly available data breach during the reconnaissance phase of the penetration test. Which of the following is the best action for the tester to take?
Answer: C Next Question
Total Questions: 445