Pass the CompTIA PenTest+ PT0-002 Questions and answers with CertsForce

Viewing page 1 out of 14 pages
Viewing questions 1-10 out of questions
Questions # 1:

During a penetration test, the domain names, IP ranges, hosts, and applications are defined in the:

Options:

A.

SOW.


B.

SLA.


C.

ROE.


D.

NDA


Expert Solution
Questions # 2:

A penetration tester has gained access to the Chief Executive Officer's (CEO's) internal, corporate email. The next objective is to gain access to the network.

Which of the following methods will MOST likely work?

Options:

A.

Try to obtain the private key used for S/MIME from the CEO's account.


B.

Send an email from the CEO's account, requesting a new account.


C.

Move laterally from the mail server to the domain controller.


D.

Attempt to escalate privileges on the mail server to gain root access.


Expert Solution
Questions # 3:

Which of the following documents describes activities that are prohibited during a scheduled penetration test?

Options:

A.

MSA


B.

NDA


C.

ROE


D.

SLA


Expert Solution
Questions # 4:

A penetration tester receives the following results from an Nmap scan:

Question # 4

Which of the following OSs is the target MOST likely running?

Options:

A.

CentOS


B.

Arch Linux


C.

Windows Server


D.

Ubuntu


Expert Solution
Questions # 5:

Which of the following assessment methods is MOST likely to cause harm to an ICS environment?

Options:

A.

Active scanning


B.

Ping sweep


C.

Protocol reversing


D.

Packet analysis


Expert Solution
Questions # 6:

A penetration tester wrote the following Bash script to brute force a local service password:

..ting as expected. Which of the following changes should the penetration tester make to get the script to work?

Options:

A.

..e

cho "The correct password is $p" && break)

ho "The correct password is $p" I| break


B.

.e

cho "The correct password is $p" && break)

o "The correct password is $p" I break


C.

e

cho "The correct password is Sp" && break)

echo "The correct password is $p" && break)


D.

.

{ echo "The correct password is $p" && break )

With


E.

( echo "The correct password is $p" && break )


Expert Solution
Questions # 7:

A penetration tester, who is doing an assessment, discovers an administrator has been exfiltrating proprietary company information. The administrator offers to pay the tester to keep quiet. Which of the following is the BEST action for the tester to take?

Options:

A.

Check the scoping document to determine if exfiltration is within scope.


B.

Stop the penetration test.


C.

Escalate the issue.


D.

Include the discovery and interaction in the daily report.


Expert Solution
Questions # 8:

A penetration tester initiated the transfer of a large data set to verify a proof-of-concept attack as permitted by the ROE. The tester noticed the client's data included PII, which is out of scope, and immediately stopped the transfer. Which of the following MOST likely explains the penetration tester's decision?

Options:

A.

The tester had the situational awareness to stop the transfer.


B.

The tester found evidence of prior compromise within the data set.


C.

The tester completed the assigned part of the assessment workflow.


D.

The tester reached the end of the assessment time frame.


Expert Solution
Questions # 9:

Which of the following is the MOST important information to have on a penetration testing report that is written for the developers?

Options:

A.

Executive summary


B.

Remediation


C.

Methodology


D.

Metrics and measures


Expert Solution
Questions # 10:

An Nmap scan of a network switch reveals the following:

Question # 10

Which of the following technical controls will most likely be the FIRST recommendation for this device?

Options:

A.

Encrypted passwords


B.

System-hardening techniques


C.

Multifactor authentication


D.

Network segmentation


Expert Solution
Viewing page 1 out of 14 pages
Viewing questions 1-10 out of questions