CompTIA PT0-002 Practice Test - Questions Answers, Page 16

List of questions
Question 151

Which of the following types of information would MOST likely be included in an application security assessment report addressed to developers? (Choose two.)
Question 152

A penetration tester has found indicators that a privileged user's password might be the same on 30 different Linux systems. Which of the following tools can help the tester identify the number of systems on which the password can be used?
Question 153

A penetration tester was able to compromise a server and escalate privileges. Which of the following should the tester perform AFTER concluding the activities on the specified target? (Choose two.)
Question 154

During a penetration test, the domain names, IP ranges, hosts, and applications are defined in the:
Question 155

A penetration tester has established an on-path position between a target host and local network services but has not been able to establish an on-path position between the target host and the
Internet. Regardless, the tester would like to subtly redirect HTTP connections to a spoofed server IP.
Which of the following methods would BEST support the objective?
Question 156

A Chief Information Security Officer wants to evaluate the security of the company's e-commerce application. Which of the following tools should a penetration tester use FIRST to obtain relevant information from the application without triggering alarms?
Question 157

Which of the following documents must be signed between the penetration tester and the client to govern how any provided information is managed before, during, and after the engagement?
Question 158

A penetration tester needs to upload the results of a port scan to a centralized security tool. Which of the following commands would allow the tester to save the results in an interchangeable format?
Question 159

An Nmap scan of a network switch reveals the following:
Which of the following technical controls will most likely be the FIRST recommendation for this device?
Question 160

A penetration tester, who is doing an assessment, discovers an administrator has been exfiltrating proprietary company information. The administrator offers to pay the tester to keep quiet. Which of the following is the BEST action for the tester to take?
Question