ExamGecko

PT0-002: CompTIA PenTest+ Certification

CompTIA PenTest+ Certification
Vendor:

CompTIA

CompTIA PenTest+ Certification Exam Questions: 445
CompTIA PenTest+ Certification   2.372 Learners
Take Practice Tests
Comming soon
PDF | VPLUS

Exam Number: PT0-002

Exam Name: CompTIA PenTest+ Certification

Length of test: 165 mins

Exam Format: Multiple-choice, Drag and Drop, and HOTSPOT questions.

Exam Language: English

Number of questions in the actual exam: Maximum of 90 questions

Passing Score: 750/900

The CompTIA PT0-002 exam requires a competency level of intermediate. This exam is designed to test a candidate’s knowledge and skills related to setting up, configuring, and maintaining physical and virtual networks. Candidates should have a good understanding of networking concepts, including IP addressing, subnetting, routing, switching, and security.

This study guide should help you understand what to expect on PT0-002 exam and includes a summary of the topics the exam might cover and links to additional resources. The information and materials in this document should help you focus your studies as you prepare for the exam.

Related questions

A penetration tester gains access to a system and is able to migrate to a user process:

Given the output above, which of the following actions is the penetration tester performing?

(Choose two.)

A.
Redirecting output from a file to a remote system
A.
Redirecting output from a file to a remote system
Answers
B.
Building a scheduled task for execution
B.
Building a scheduled task for execution
Answers
C.
Mapping a share to a remote system
C.
Mapping a share to a remote system
Answers
D.
Executing a file on the remote system
D.
Executing a file on the remote system
Answers
E.
Creating a new process on all domain systems
E.
Creating a new process on all domain systems
Answers
F.
Setting up a reverse shell from a remote system
F.
Setting up a reverse shell from a remote system
Answers
G.
Adding an additional IP address on the compromised system
G.
Adding an additional IP address on the compromised system
Answers
Suggested answer: C, D

Explanation:

WMIC.exe is a built-in Microsoft program that allows command-line access to the Windows Management Instrumentation. Using this tool, administrators can query the operating system for detailed information about installed hardware and Windows settings, run management tasks, and even execute other programs or commands.

asked 02/10/2024
Edwin Daneel
32 questions

After successfully compromising a remote host, a security consultant notices an endpoint protection software is running on the host. Which of the following commands would be best for the consultant to use to terminate the protection software and its child processes?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

A penetration tester is conducting an assessment against a group of publicly available web servers and notices a number of TCP resets returning from one of the web servers. Which of the following is MOST likely causing the TCP resets to occur during the assessment?

A.
The web server is using a WAF.
A.
The web server is using a WAF.
Answers
B.
The web server is behind a load balancer.
B.
The web server is behind a load balancer.
Answers
C.
The web server is redirecting the requests.
C.
The web server is redirecting the requests.
Answers
D.
The local antivirus on the web server Is rejecting the connection.
D.
The local antivirus on the web server Is rejecting the connection.
Answers
Suggested answer: A

Explanation:

A Web Application Firewall (WAF) is designed to monitor, filter or block traffic to a web application. A WAF will monitor incoming and outgoing traffic from a web application and is often used to protect web servers from attacks such as SQL Injection, Cross-Site Scripting (XSS), and other forms of attacks.

If a WAF detects an attack, it will often reset the TCP connection, causing the connection to be terminated. As a result, a penetration tester may see TCP resets when a WAF is present. Therefore, the most likely reason for the TCP resets returning from the web server is that the web server is using a WAF.

asked 02/10/2024
Hans Walter Katzengruber
27 questions

When accessing the URL http://192.168.0-1/validate/user.php, a penetration tester obtained the following output:

..d index: eid in /apache/www/validate/user.php line 12

..d index: uid in /apache/www/validate/user.php line 13

..d index: pw in /apache/www/validate/user.php line 14

..d index: acl in /apache/www/validate/user.php line 15

A.
Lack of code signing
A.
Lack of code signing
Answers
B.
Incorrect command syntax
B.
Incorrect command syntax
Answers
C.
Insufficient error handling
C.
Insufficient error handling
Answers
D.
Insecure data transmission
D.
Insecure data transmission
Answers
Suggested answer: C

Explanation:

The most probable cause for this output is insufficient error handling, which is a coding flaw that occurs when a program does not handle errors or exceptions properly or gracefully. Insufficient error handling can result in unwanted or unexpected behavior, such as crashes, hangs, or leaks. In this case, the output shows that the program is displaying warning messages that indicate undefined indexes in the user.php file. These messages reveal the names of the variables and the file path that are used by the program, which can expose sensitive information or clues to an attacker. The program should have implemented error handling mechanisms, such as try-catch blocks, error logging, or sanitizing output, to prevent these messages from being displayed or to handle them appropriately. The other options are not plausible causes for this output. Lack of code signing is a security flaw that occurs when a program does not have a digital signature that verifies its authenticity and integrity. Incorrect command syntax is a user error that occurs when a command is entered with wrong or missing parameters or options. Insecure data transmission is a security flaw that occurs when data is sent over a network without encryption or protection.

asked 02/10/2024
First Last
36 questions

A Chief Information Security Officer wants a penetration tester to evaluate the security awareness level of the company's employees.

Which of the following tools can help the tester achieve this goal?

A.
Metasploit
A.
Metasploit
Answers
B.
Hydra
B.
Hydra
Answers
C.
SET
C.
SET
Most voted
Answers (1)
Most voted
D.
WPScan
D.
WPScan
Answers
Suggested answer: A
asked 02/10/2024
Sam K
30 questions

An organization is using Android mobile devices but does not use MDM services. Which of the following describes an existing risk present in this scenario?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

A penetration tester is conducting an unknown environment test and gathering additional information that can be used for later stages of an assessment. Which of the following would most likely produce useful information for additional testing?

A.
Searching for code repositories associated with a developer who previously worked for the target company code repositories associated with the
A.
Searching for code repositories associated with a developer who previously worked for the target company code repositories associated with the
Answers
B.
Searching for code repositories target company's organization
B.
Searching for code repositories target company's organization
Answers
C.
Searching for code repositories associated with the target company's organization
C.
Searching for code repositories associated with the target company's organization
Answers
D.
Searching for code repositories associated with a developer who previously worked for the target company
D.
Searching for code repositories associated with a developer who previously worked for the target company
Answers
Suggested answer: B

Explanation:

Code repositories are online platforms that store and manage source code and other files related to software development projects. Code repositories can contain useful information for additional testing, such as application names, versions, features, functions, vulnerabilities, dependencies, credentials, comments, or documentation. Searching for code repositories associated with the target company's organization would most likely produce useful information for additional testing, as it would reveal the software projects that the target company is working on or using, and potentially expose some weaknesses or flaws that can be exploited. Code repositories can be searched by using tools such as GitHub, GitLab, Bitbucket, or SourceForge1. The other options are not as likely to produce useful information for additional testing, as they are not directly related to the target company's software development activities. Searching for code repositories associated with a developer who previously worked for the target company may not yield any relevant or current information, as the developer may have deleted, moved, or updated their code repositories after leaving the company. Searching for code repositories associated with the target company's competitors or customers may not yield any useful or accessible information, as they may have different or unrelated software projects, or they may have restricted or protected their code repositories from public view.

asked 02/10/2024
Aparecido da Silva Lemos
25 questions

Which of the following components should a penetration tester most likely include in a report at the end of an assessment?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

A penetration tester was hired to test Wi-Fi equipment. Which of the following tools should be used to gather information about the wireless network?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

A consulting company is completing the ROE during scoping.

Which of the following should be included in the ROE?

A.
Cost ofthe assessment
A.
Cost ofthe assessment
Answers
B.
Report distribution
B.
Report distribution
Answers
C.
Testing restrictions
C.
Testing restrictions
Most voted
Answers (1)
Most voted
D.
Liability
D.
Liability
Answers
Suggested answer: B
asked 02/10/2024
Oleksandr Kondratchuk
35 questions