New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA PenTest+ PT0-002 Questions and answers with CertsForce

Viewing page 2 out of 14 pages
Viewing questions 11-20 out of questions
Questions # 11:

PCI DSS requires which of the following as part of the penetration-testing process?

Options:

A.

The penetration tester must have cybersecurity certifications.


B.

The network must be segmented.


C.

Only externally facing systems should be tested.


D.

The assessment must be performed during non-working hours.


Expert Solution
Questions # 12:

Which of the following tools provides Python classes for interacting with network protocols?

Options:

A.

Responder


B.

Impacket


C.

Empire


D.

PowerSploit


Expert Solution
Questions # 13:

The following PowerShell snippet was extracted from a log of an attacker machine:

Question # 13

A penetration tester would like to identify the presence of an array. Which of the following line numbers would define the array?

Options:

A.

Line 8


B.

Line 13


C.

Line 19


D.

Line 20


Expert Solution
Questions # 14:

Which of the following tools would BEST allow a penetration tester to capture wireless handshakes to reveal a Wi-Fi password from a Windows machine?

Options:

A.

Wireshark


B.

EAPHammer


C.

Kismet


D.

Aircrack-ng


Expert Solution
Questions # 15:

Which of the following is a rules engine for managing public cloud accounts and resources?

Options:

A.

Cloud Custodian


B.

Cloud Brute


C.

Pacu


D.

Scout Suite


Expert Solution
Questions # 16:

During a penetration test, a tester is in close proximity to a corporate mobile device belonging to a network administrator that is broadcasting Bluetooth frames.

Which of the following is an example of a Bluesnarfing attack that the penetration tester can perform?

Options:

A.

Sniff and then crack the WPS PIN on an associated WiFi device.


B.

Dump the user address book on the device.


C.

Break a connection between two Bluetooth devices.


D.

Transmit text messages to the device.


Expert Solution
Questions # 17:

Which of the following is the MOST important information to have on a penetration testing report that is written for the developers?

Options:

A.

Executive summary


B.

Remediation


C.

Methodology


D.

Metrics and measures


Expert Solution
Questions # 18:

A penetration tester downloaded the following Perl script that can be used to identify vulnerabilities in network switches. However, the script is not working properly.

Which of the following changes should the tester apply to make the script work as intended?

Options:

A.

Change line 2 to $ip= ג€10.192.168.254ג€;


B.

Remove lines 3, 5, and 6.


C.

Remove line 6.


D.

Move all the lines below line 7 to the top of the script.


Expert Solution
Questions # 19:

Which of the following BEST explains why a penetration tester cannot scan a server that was previously scanned successfully?

Options:

A.

The IP address is wrong.


B.

The server is unreachable.


C.

The IP address is on the blocklist.


D.

The IP address is on the allow list.


Expert Solution
Questions # 20:

A penetration tester was able to compromise a server and escalate privileges. Which of the following should the tester perform AFTER concluding the activities on the specified target? (Choose two.)

Options:

A.

Remove the logs from the server.


B.

Restore the server backup.


C.

Disable the running services.


D.

Remove any tools or scripts that were installed.


E.

Delete any created credentials.


F.

Reboot the target server.


Expert Solution
Viewing page 2 out of 14 pages
Viewing questions 11-20 out of questions