ExamGecko
Home / CompTIA / PT0-002 / List of questions
Ask Question

CompTIA PT0-002 Practice Test - Questions Answers, Page 10

Add to Whishlist

List of questions

Question 91

Report Export Collapse

Running a vulnerability scanner on a hybrid network segment that includes general IT servers and industrial control systems:

will reveal vulnerabilities in the Modbus protocol.
will reveal vulnerabilities in the Modbus protocol.
may cause unintended failures in control systems.
may cause unintended failures in control systems.
may reduce the true positive rate of findings.
may reduce the true positive rate of findings.
will create a denial-of-service condition on the IP networks.
will create a denial-of-service condition on the IP networks.
Suggested answer: B
Explanation:

Reference: https://www.hsdl.org/?view&did=7262

asked 02/10/2024
Renata Maria DA SILVA
49 questions

Question 92

Report Export Collapse

An Nmap network scan has found five open ports with identified services. Which of the following tools should a penetration tester use NEXT to determine if any vulnerabilities with associated exploits exist on the open ports?

Become a Premium Member for full access
  Unlock Premium Member

Question 93

Report Export Collapse

A penetration tester would like to obtain FTP credentials by deploying a workstation as an on-path attack between the target and the server that has the FTP protocol. Which of the following methods would be the BEST to accomplish this objective?

Become a Premium Member for full access
  Unlock Premium Member

Question 94

Report Export Collapse

Penetration-testing activities have concluded, and the initial findings have been reviewed with the client. Which of the following best describes the NEXT step in the engagement?

Become a Premium Member for full access
  Unlock Premium Member

Question 95

Report Export Collapse

A penetration tester discovered a vulnerability that provides the ability to upload to a path via directory traversal. Some of the files that were discovered through this vulnerability are:

CompTIA PT0-002 image Question 95 97224 10022024175320000000

Which of the following is the BEST method to help an attacker gain internal access to the affected machine?

Become a Premium Member for full access
  Unlock Premium Member

Question 96

Report Export Collapse

A penetration tester has established an on-path attack position and must now specially craft a DNS query response to be sent back to a target host. Which of the following utilities would BEST support this objective?

Become a Premium Member for full access
  Unlock Premium Member

Question 97

Report Export Collapse

A penetration tester ran the following command on a staging server:

python -m SimpleHTTPServer 9891

Which of the following commands could be used to download a file named exploit to a target machine for execution?

Become a Premium Member for full access
  Unlock Premium Member

Question 98

Report Export Collapse

When developing a shell script intended for interpretation in Bash, the interpreter /bin/bash should be explicitly specified. Which of the following character combinations should be used on the first line of the script to accomplish this goal?

Become a Premium Member for full access
  Unlock Premium Member

Question 99

Report Export Collapse

In an unprotected network file repository, a penetration tester discovers a text file containing usernames and passwords in cleartext and a spreadsheet containing data for 50 employees, including full names, roles, and serial numbers. The tester realizes some of the passwords in the text file follow the format: <name- serial_number>. Which of the following would be the best action for the tester to take NEXT with this information?

Become a Premium Member for full access
  Unlock Premium Member

Question 100

Report Export Collapse

Which of the following is the MOST effective person to validate results from a penetration test?

Become a Premium Member for full access
  Unlock Premium Member
Total 464 questions
Go to page: of 47
Search

Related questions