ExamGecko
Home / CompTIA / PT0-002
Ask Question

PT0-002: CompTIA PenTest+ Certification

Vendor:
Exam Questions:
464
 Learners
  2.372
Last Updated
February - 2025
Language
English
12 Quizzes
PDF | VPLUS

Exam Number: PT0-002

Exam Name: CompTIA PenTest+ Certification

Length of test: 165 mins

Exam Format: Multiple-choice, Drag and Drop, and HOTSPOT questions.

Exam Language: English

Number of questions in the actual exam: Maximum of 90 questions

Passing Score: 750/900

The CompTIA PT0-002 exam requires a competency level of intermediate. This exam is designed to test a candidate’s knowledge and skills related to setting up, configuring, and maintaining physical and virtual networks. Candidates should have a good understanding of networking concepts, including IP addressing, subnetting, routing, switching, and security.

This study guide should help you understand what to expect on PT0-002 exam and includes a summary of the topics the exam might cover and links to additional resources. The information and materials in this document should help you focus your studies as you prepare for the exam.

Related questions

A penetration tester gains access to a system and is able to migrate to a user process:

CompTIA PT0-002 image Question 191 97320 10022024175321000000

Given the output above, which of the following actions is the penetration tester performing?

(Choose two.)

Redirecting output from a file to a remote system
Redirecting output from a file to a remote system
Building a scheduled task for execution
Building a scheduled task for execution
Mapping a share to a remote system
Mapping a share to a remote system
Executing a file on the remote system
Executing a file on the remote system
Creating a new process on all domain systems
Creating a new process on all domain systems
Setting up a reverse shell from a remote system
Setting up a reverse shell from a remote system
Adding an additional IP address on the compromised system
Adding an additional IP address on the compromised system
Suggested answer: C, D
Explanation:

WMIC.exe is a built-in Microsoft program that allows command-line access to the Windows Management Instrumentation. Using this tool, administrators can query the operating system for detailed information about installed hardware and Windows settings, run management tasks, and even execute other programs or commands.

asked 02/10/2024
Edwin Daneel
32 questions

After successfully compromising a remote host, a security consultant notices an endpoint protection software is running on the host. Which of the following commands would be best for the consultant to use to terminate the protection software and its child processes?

Become a Premium Member for full access
  Unlock Premium Member

A penetration tester is conducting an assessment against a group of publicly available web servers and notices a number of TCP resets returning from one of the web servers. Which of the following is MOST likely causing the TCP resets to occur during the assessment?

The web server is using a WAF.
The web server is using a WAF.
The web server is behind a load balancer.
The web server is behind a load balancer.
The web server is redirecting the requests.
The web server is redirecting the requests.
The local antivirus on the web server Is rejecting the connection.
The local antivirus on the web server Is rejecting the connection.
Suggested answer: A
Explanation:

A Web Application Firewall (WAF) is designed to monitor, filter or block traffic to a web application. A WAF will monitor incoming and outgoing traffic from a web application and is often used to protect web servers from attacks such as SQL Injection, Cross-Site Scripting (XSS), and other forms of attacks.

If a WAF detects an attack, it will often reset the TCP connection, causing the connection to be terminated. As a result, a penetration tester may see TCP resets when a WAF is present. Therefore, the most likely reason for the TCP resets returning from the web server is that the web server is using a WAF.

asked 02/10/2024
Hans Walter Katzengruber
27 questions

When accessing the URL http://192.168.0-1/validate/user.php, a penetration tester obtained the following output:

..d index: eid in /apache/www/validate/user.php line 12

..d index: uid in /apache/www/validate/user.php line 13

..d index: pw in /apache/www/validate/user.php line 14

..d index: acl in /apache/www/validate/user.php line 15

Lack of code signing
Lack of code signing
Incorrect command syntax
Incorrect command syntax
Insufficient error handling
Insufficient error handling
Insecure data transmission
Insecure data transmission
Suggested answer: C
Explanation:

The most probable cause for this output is insufficient error handling, which is a coding flaw that occurs when a program does not handle errors or exceptions properly or gracefully. Insufficient error handling can result in unwanted or unexpected behavior, such as crashes, hangs, or leaks. In this case, the output shows that the program is displaying warning messages that indicate undefined indexes in the user.php file. These messages reveal the names of the variables and the file path that are used by the program, which can expose sensitive information or clues to an attacker. The program should have implemented error handling mechanisms, such as try-catch blocks, error logging, or sanitizing output, to prevent these messages from being displayed or to handle them appropriately. The other options are not plausible causes for this output. Lack of code signing is a security flaw that occurs when a program does not have a digital signature that verifies its authenticity and integrity. Incorrect command syntax is a user error that occurs when a command is entered with wrong or missing parameters or options. Insecure data transmission is a security flaw that occurs when data is sent over a network without encryption or protection.

asked 02/10/2024
First Last
36 questions

A Chief Information Security Officer wants a penetration tester to evaluate the security awareness level of the company's employees.

Which of the following tools can help the tester achieve this goal?

Metasploit
Metasploit
Hydra
Hydra
SET
SET
Most voted
(1)
Most voted
WPScan
WPScan
Suggested answer: A
asked 02/10/2024
Sam K
30 questions

An organization is using Android mobile devices but does not use MDM services. Which of the following describes an existing risk present in this scenario?

Become a Premium Member for full access
  Unlock Premium Member

A penetration tester is conducting an unknown environment test and gathering additional information that can be used for later stages of an assessment. Which of the following would most likely produce useful information for additional testing?

Searching for code repositories associated with a developer who previously worked for the target company code repositories associated with the
Searching for code repositories associated with a developer who previously worked for the target company code repositories associated with the
Searching for code repositories target company's organization
Searching for code repositories target company's organization
Searching for code repositories associated with the target company's organization
Searching for code repositories associated with the target company's organization
Searching for code repositories associated with a developer who previously worked for the target company
Searching for code repositories associated with a developer who previously worked for the target company
Suggested answer: B
Explanation:

Code repositories are online platforms that store and manage source code and other files related to software development projects. Code repositories can contain useful information for additional testing, such as application names, versions, features, functions, vulnerabilities, dependencies, credentials, comments, or documentation. Searching for code repositories associated with the target company's organization would most likely produce useful information for additional testing, as it would reveal the software projects that the target company is working on or using, and potentially expose some weaknesses or flaws that can be exploited. Code repositories can be searched by using tools such as GitHub, GitLab, Bitbucket, or SourceForge1. The other options are not as likely to produce useful information for additional testing, as they are not directly related to the target company's software development activities. Searching for code repositories associated with a developer who previously worked for the target company may not yield any relevant or current information, as the developer may have deleted, moved, or updated their code repositories after leaving the company. Searching for code repositories associated with the target company's competitors or customers may not yield any useful or accessible information, as they may have different or unrelated software projects, or they may have restricted or protected their code repositories from public view.

asked 02/10/2024
Aparecido da Silva Lemos
25 questions

Which of the following components should a penetration tester most likely include in a report at the end of an assessment?

Become a Premium Member for full access
  Unlock Premium Member

A penetration tester was hired to test Wi-Fi equipment. Which of the following tools should be used to gather information about the wireless network?

Become a Premium Member for full access
  Unlock Premium Member

A consulting company is completing the ROE during scoping.

Which of the following should be included in the ROE?

Cost ofthe assessment
Cost ofthe assessment
Report distribution
Report distribution
Testing restrictions
Testing restrictions
Most voted
(1)
Most voted
Liability
Liability
Suggested answer: B
asked 02/10/2024
Oleksandr Kondratchuk
35 questions