ExamGecko
Home / CompTIA / PT0-002 / List of questions
Ask Question

CompTIA PT0-002 Practice Test - Questions Answers, Page 16

Add to Whishlist

List of questions

Question 151

Report Export Collapse

Which of the following types of information would MOST likely be included in an application security assessment report addressed to developers? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 152

Report Export Collapse

A penetration tester has found indicators that a privileged user's password might be the same on 30 different Linux systems. Which of the following tools can help the tester identify the number of systems on which the password can be used?

Become a Premium Member for full access
  Unlock Premium Member

Question 153

Report Export Collapse

A penetration tester was able to compromise a server and escalate privileges. Which of the following should the tester perform AFTER concluding the activities on the specified target? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 154

Report Export Collapse

During a penetration test, the domain names, IP ranges, hosts, and applications are defined in the:

Become a Premium Member for full access
  Unlock Premium Member

Question 155

Report Export Collapse

A penetration tester has established an on-path position between a target host and local network services but has not been able to establish an on-path position between the target host and the

Internet. Regardless, the tester would like to subtly redirect HTTP connections to a spoofed server IP.

Which of the following methods would BEST support the objective?

Become a Premium Member for full access
  Unlock Premium Member

Question 156

Report Export Collapse

A Chief Information Security Officer wants to evaluate the security of the company's e-commerce application. Which of the following tools should a penetration tester use FIRST to obtain relevant information from the application without triggering alarms?

Become a Premium Member for full access
  Unlock Premium Member

Question 157

Report Export Collapse

Which of the following documents must be signed between the penetration tester and the client to govern how any provided information is managed before, during, and after the engagement?

Become a Premium Member for full access
  Unlock Premium Member

Question 158

Report Export Collapse

A penetration tester needs to upload the results of a port scan to a centralized security tool. Which of the following commands would allow the tester to save the results in an interchangeable format?

Become a Premium Member for full access
  Unlock Premium Member

Question 159

Report Export Collapse

An Nmap scan of a network switch reveals the following:

CompTIA PT0-002 image Question 159 97288 10022024175321000000

Which of the following technical controls will most likely be the FIRST recommendation for this device?

Become a Premium Member for full access
  Unlock Premium Member

Question 160

Report Export Collapse

A penetration tester, who is doing an assessment, discovers an administrator has been exfiltrating proprietary company information. The administrator offers to pay the tester to keep quiet. Which of the following is the BEST action for the tester to take?

Become a Premium Member for full access
  Unlock Premium Member
Total 464 questions
Go to page: of 47
Search

Related questions