CompTIA PenTest+ Certification Exam PT0-002 Question # 15 Topic 2 Discussion

CompTIA PenTest+ Certification Exam PT0-002 Question # 15 Topic 2 Discussion

PT0-002 Exam Topic 2 Question 15 Discussion:
Question #: 15
Topic #: 2

A penetration tester downloaded a Java application file from a compromised web server and identifies how to invoke it by looking at the following log:

PT0-002 Question 15

Which of the following is the order of steps the penetration tester needs to follow to validate whether the Java application uses encryption over sockets?


A.

Run an application vulnerability scan and then identify the TCP ports used by the application.


B.

Run the application attached to a debugger and then review the application's log.


C.

Disassemble the binary code and then identify the break points.


D.

Start a packet capture with Wireshark and then run the application.


Get Premium PT0-002 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.