ExamGecko
Home Home / CompTIA / PT0-002

CompTIA PT0-002 Practice Test - Questions Answers, Page 16

Question list
Search
Search

List of questions

Search

Related questions











Which of the following types of information would MOST likely be included in an application security assessment report addressed to developers? (Choose two.)

A.
Use of non-optimized sort functions
A.
Use of non-optimized sort functions
Answers
B.
Poor input sanitization
B.
Poor input sanitization
Answers
C.
Null pointer dereferences
C.
Null pointer dereferences
Answers
D.
Non-compliance with code style guide
D.
Non-compliance with code style guide
Answers
E.
Use of deprecated Javadoc tags
E.
Use of deprecated Javadoc tags
Answers
F.
A cydomatic complexity score of 3
F.
A cydomatic complexity score of 3
Answers
Suggested answer: B, C

A penetration tester has found indicators that a privileged user's password might be the same on 30 different Linux systems. Which of the following tools can help the tester identify the number of systems on which the password can be used?

A.
Hydra
A.
Hydra
Answers
B.
John the Ripper
B.
John the Ripper
Answers
C.
Cain and Abel
C.
Cain and Abel
Answers
D.
Medusa
D.
Medusa
Answers
Suggested answer: D

Explanation:

Both Hydra and Medusa can be used for that same purpose:

THC Hydra is a brute-force cracking tool for remote authentication services. It supports many protocols, including telnet, FTP, LDAP, SSH, SNMP, and others.

Medusa is a Parallel, Modular and Speedy method for brute-force which issued for remote authentication. Following are the applications and protocols like modular design, Thread based parallel testing and flexible user input and protocols are AFP, CVS, FTP, HTTP, IMAP etc.

A penetration tester was able to compromise a server and escalate privileges. Which of the following should the tester perform AFTER concluding the activities on the specified target? (Choose two.)

A.
Remove the logs from the server.
A.
Remove the logs from the server.
Answers
B.
Restore the server backup.
B.
Restore the server backup.
Answers
C.
Disable the running services.
C.
Disable the running services.
Answers
D.
Remove any tools or scripts that were installed.
D.
Remove any tools or scripts that were installed.
Answers
E.
Delete any created credentials.
E.
Delete any created credentials.
Answers
F.
Reboot the target server.
F.
Reboot the target server.
Answers
Suggested answer: D, E

During a penetration test, the domain names, IP ranges, hosts, and applications are defined in the:

A.
SOW.
A.
SOW.
Answers
B.
SLA.
B.
SLA.
Answers
C.
ROE.
C.
ROE.
Answers
D.
NDA
D.
NDA
Answers
Suggested answer: C

Explanation:

https://mainnerve.com/what-are-rules-of-engagement-in-pentesting/#:~:text=The%20ROE%20includes%20the%20dates,limits%2C%20or%20out%20of%20scope.

A penetration tester has established an on-path position between a target host and local network services but has not been able to establish an on-path position between the target host and the

Internet. Regardless, the tester would like to subtly redirect HTTP connections to a spoofed server IP.

Which of the following methods would BEST support the objective?

A.
Gain access to the target host and implant malware specially crafted for this purpose.
A.
Gain access to the target host and implant malware specially crafted for this purpose.
Answers
B.
Exploit the local DNS server and add/update the zone records with a spoofed A record.
B.
Exploit the local DNS server and add/update the zone records with a spoofed A record.
Answers
C.
Use the Scapy utility to overwrite name resolution fields in the DNS query response.
C.
Use the Scapy utility to overwrite name resolution fields in the DNS query response.
Answers
D.
Proxy HTTP connections from the target host to that of the spoofed host.
D.
Proxy HTTP connections from the target host to that of the spoofed host.
Answers
Suggested answer: D

A Chief Information Security Officer wants to evaluate the security of the company's e-commerce application. Which of the following tools should a penetration tester use FIRST to obtain relevant information from the application without triggering alarms?

A.
SQLmap
A.
SQLmap
Answers
B.
DirBuster
B.
DirBuster
Answers
C.
w3af
C.
w3af
Answers
D.
OWASP ZAP
D.
OWASP ZAP
Answers
Suggested answer: C

Explanation:

W3AF, the Web Application Attack and Audit Framework, is an open source web application security scanner that includes directory and filename brute-forcing in its list of capabilities.

Which of the following documents must be signed between the penetration tester and the client to govern how any provided information is managed before, during, and after the engagement?

A.
MSA
A.
MSA
Answers
B.
NDA
B.
NDA
Answers
C.
SOW
C.
SOW
Answers
D.
ROE
D.
ROE
Answers
Suggested answer: B

A penetration tester needs to upload the results of a port scan to a centralized security tool. Which of the following commands would allow the tester to save the results in an interchangeable format?

A.
nmap -iL results 192.168.0.10-100
A.
nmap -iL results 192.168.0.10-100
Answers
B.
nmap 192.168.0.10-100 -O > results
B.
nmap 192.168.0.10-100 -O > results
Answers
C.
nmap -A 192.168.0.10-100 -oX results
C.
nmap -A 192.168.0.10-100 -oX results
Answers
D.
nmap 192.168.0.10-100 | grep "results"
D.
nmap 192.168.0.10-100 | grep "results"
Answers
Suggested answer: C

An Nmap scan of a network switch reveals the following:

Which of the following technical controls will most likely be the FIRST recommendation for this device?

A.
Encrypted passwords
A.
Encrypted passwords
Answers
B.
System-hardening techniques
B.
System-hardening techniques
Answers
C.
Multifactor authentication
C.
Multifactor authentication
Answers
D.
Network segmentation
D.
Network segmentation
Answers
Suggested answer: B

A penetration tester, who is doing an assessment, discovers an administrator has been exfiltrating proprietary company information. The administrator offers to pay the tester to keep quiet. Which of the following is the BEST action for the tester to take?

A.
Check the scoping document to determine if exfiltration is within scope.
A.
Check the scoping document to determine if exfiltration is within scope.
Answers
B.
Stop the penetration test.
B.
Stop the penetration test.
Answers
C.
Escalate the issue.
C.
Escalate the issue.
Answers
D.
Include the discovery and interaction in the daily report.
D.
Include the discovery and interaction in the daily report.
Answers
Suggested answer: B

Explanation:

"Another reason to communicate with the customer is to let the customer know if something unexpected arises while doing the pentest, such as if a critical vulnerability is found on a system, a new target system is found that is outside the scope of the penetration test targets, or a security breach is discovered when doing the penetration test. You will need to discuss how to handle such discoveries and who to contact if those events occur. In case of such events, you typically stop the pentest temporarily to discuss the issue with the customer, then resume once a resolution has been determined."

Total 422 questions
Go to page: of 43