ExamGecko
Home Home / CompTIA / PT0-002

CompTIA PT0-002 Practice Test - Questions Answers, Page 15

Question list
Search
Search

List of questions

Search

Related questions











A penetration tester needs to access a building that is guarded by locked gates, a security team, and cameras. Which of the following is a technique the tester can use to gain access to the IT framework without being detected?

A.
Pick a lock.
A.
Pick a lock.
Answers
B.
Disable the cameras remotely.
B.
Disable the cameras remotely.
Answers
C.
Impersonate a package delivery worker.
C.
Impersonate a package delivery worker.
Answers
D.
Send a phishing email.
D.
Send a phishing email.
Answers
Suggested answer: C

A penetration tester is assessing a wireless network. Although monitoring the correct channel and SSID, the tester is unable to capture a handshake between the clients and the AP. Which of the following attacks is the MOST effective to allow the penetration tester to capture a handshake?

A.
Key reinstallation
A.
Key reinstallation
Answers
B.
Deauthentication
B.
Deauthentication
Answers
C.
Evil twin
C.
Evil twin
Answers
D.
Replay
D.
Replay
Answers
Suggested answer: B

Explanation:

Deauth will make the client connect again

PCI DSS requires which of the following as part of the penetration-testing process?

A.
The penetration tester must have cybersecurity certifications.
A.
The penetration tester must have cybersecurity certifications.
Answers
B.
The network must be segmented.
B.
The network must be segmented.
Answers
C.
Only externally facing systems should be tested.
C.
Only externally facing systems should be tested.
Answers
D.
The assessment must be performed during non-working hours.
D.
The assessment must be performed during non-working hours.
Answers
Suggested answer: B

A penetration tester completed an assessment, removed all artifacts and accounts created during the test, and presented the findings to the client. Which of the following happens NEXT?

A.
The penetration tester conducts a retest.
A.
The penetration tester conducts a retest.
Answers
B.
The penetration tester deletes all scripts from the client machines.
B.
The penetration tester deletes all scripts from the client machines.
Answers
C.
The client applies patches to the systems.
C.
The client applies patches to the systems.
Answers
D.
The client clears system logs generated during the test.
D.
The client clears system logs generated during the test.
Answers
Suggested answer: C

A penetration tester is examining a Class C network to identify active systems quickly. Which of the following commands should the penetration tester use?

A.
nmap ?sn 192.168.0.1/16
A.
nmap ?sn 192.168.0.1/16
Answers
B.
nmap ?sn 192.168.0.1-254
B.
nmap ?sn 192.168.0.1-254
Answers
C.
nmap ?sn 192.168.0.1 192.168.0.1.254
C.
nmap ?sn 192.168.0.1 192.168.0.1.254
Answers
D.
nmap ?sN 192.168.0.0/24
D.
nmap ?sN 192.168.0.0/24
Answers
Suggested answer: B

A penetration tester wants to validate the effectiveness of a DLP product by attempting exfiltration of data using email attachments. Which of the following techniques should the tester select to accomplish this task?

A.
Steganography
A.
Steganography
Answers
B.
Metadata removal
B.
Metadata removal
Answers
C.
Encryption
C.
Encryption
Answers
D.
Encode64
D.
Encode64
Answers
Suggested answer: B

Explanation:

All other answers are a form of encryption or randomizing the data.

A penetration tester is reviewing the following DNS reconnaissance results for comptia.org from dig:

comptia.org. 3569 IN MX comptia.org-mail.protection.outlook.com. comptia.org. 3569 IN A 3.219.13.186. comptia.org.

3569 IN NS ns1.comptia.org. comptia.org. 3569 IN SOA haven. administrator.comptia.org.

comptia.org. 3569 IN MX new.mx0.comptia.org. comptia.org. 3569 IN MX new.mx1.comptia.org.

Which of the following potential issues can the penetration tester identify based on this output?

A.
At least one of the records is out of scope.
A.
At least one of the records is out of scope.
Answers
B.
There is a duplicate MX record.
B.
There is a duplicate MX record.
Answers
C.
The NS record is not within the appropriate domain.
C.
The NS record is not within the appropriate domain.
Answers
D.
The SOA records outside the comptia.org domain.
D.
The SOA records outside the comptia.org domain.
Answers
Suggested answer: A

A consultant just performed a SYN scan of all the open ports on a remote host and now needs to remotely identify the type of services that are running on the host. Which of the following is an active reconnaissance tool that would be BEST to use to accomplish this task?

A.
tcpdump
A.
tcpdump
Answers
B.
Snort
B.
Snort
Answers
C.
Nmap
C.
Nmap
Answers
D.
Netstat
D.
Netstat
Answers
E.
Fuzzer
E.
Fuzzer
Answers
Suggested answer: C

Deconfliction is necessary when the penetration test:

A.
determines that proprietary information is being stored in cleartext.
A.
determines that proprietary information is being stored in cleartext.
Answers
B.
occurs during the monthly vulnerability scanning.
B.
occurs during the monthly vulnerability scanning.
Answers
C.
uncovers indicators of prior compromise over the course of the assessment.
C.
uncovers indicators of prior compromise over the course of the assessment.
Answers
D.
proceeds in parallel with a criminal digital forensic investigation.
D.
proceeds in parallel with a criminal digital forensic investigation.
Answers
Suggested answer: C

Explanation:

This will then enable the PenTest to continue so that additional issues can be found, exploited, and analyzed.

A penetration tester wants to test a list of common passwords against the SSH daemon on a network device. Which of the following tools would be BEST to use for this purpose?

A.
Hashcat
A.
Hashcat
Answers
B.
Mimikatz
B.
Mimikatz
Answers
C.
Patator
C.
Patator
Answers
D.
John the Ripper
D.
John the Ripper
Answers
Suggested answer: C

Explanation:

https://www.kali.org/tools/patator/

Total 422 questions
Go to page: of 43