ExamGecko
Home / CompTIA / PT0-002 / List of questions
Ask Question

CompTIA PT0-002 Practice Test - Questions Answers, Page 13

Add to Whishlist

List of questions

Question 121

Report Export Collapse

A penetration tester conducted an assessment on a web server. The logs from this session show the following:

http://www.thecompanydomain.com/servicestatus.php?serviceID=892&serviceID=892 ' ; DROP

TABLE SERVICES; --

Which of the following attacks is being attempted?

Become a Premium Member for full access
  Unlock Premium Member

Question 122

Report Export Collapse

An assessment has been completed, and all reports and evidence have been turned over to the client. Which of the following should be done NEXT to ensure the confidentiality of the client's information?

Become a Premium Member for full access
  Unlock Premium Member

Question 123

Report Export Collapse

During a penetration-testing engagement, a consultant performs reconnaissance of a client to identify potential targets for a phishing campaign. Which of the following would allow the consultant to retrieve email addresses for technical and billing contacts quickly, without triggering any of the client's cybersecurity tools? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 124

Report Export Collapse

A company is concerned that its cloud service provider is not adequately protecting the VMs housing its software development. The VMs are housed in a datacenter with other companies sharing physical resources. Which of the following attack types is MOST concerning to the company?

Become a Premium Member for full access
  Unlock Premium Member

Question 125

Report Export Collapse

A penetration tester conducts an Nmap scan against a target and receives the following results:

CompTIA PT0-002 image Question 125 97254 10022024175321000000

Which of the following should the tester use to redirect the scanning tools using TCP port 1080 on the target?

Become a Premium Member for full access
  Unlock Premium Member

Question 126

Report Export Collapse

A penetration tester received a .pcap file to look for credentials to use in an engagement.

Which of the following tools should the tester utilize to open and read the .pcap file?

Become a Premium Member for full access
  Unlock Premium Member

Question 127

Report Export Collapse

A penetration tester has been given an assignment to attack a series of targets in the 192.168.1.0/24 range, triggering as few alarms and countermeasures as possible.

Which of the following Nmap scan syntaxes would BEST accomplish this objective?

Become a Premium Member for full access
  Unlock Premium Member

Question 128

Report Export Collapse

A penetration tester has gained access to a network device that has a previously unknown IP range on an interface. Further research determines this is an always-on VPN tunnel to a third-party supplier.

Which of the following is the BEST action for the penetration tester to take?

Become a Premium Member for full access
  Unlock Premium Member

Question 129

Report Export Collapse

A security company has been contracted to perform a scoped insider-threat assessment to try to gain access to the human resources server that houses PII and salary data. The penetration testers have been given an internal network starting position.

Which of the following actions, if performed, would be ethical within the scope of the assessment?

Become a Premium Member for full access
  Unlock Premium Member

Question 130

Report Export Collapse

A penetration tester is able to capture the NTLM challenge-response traffic between a client and a server.

Which of the following can be done with the pcap to gain access to the server?

Become a Premium Member for full access
  Unlock Premium Member
Total 464 questions
Go to page: of 47
Search

Related questions