ExamGecko
Home Home / CompTIA / PT0-002

CompTIA PT0-002 Practice Test - Questions Answers, Page 17

Question list
Search
Search

List of questions

Search

Related questions











A private investigation firm is requesting a penetration test to determine the likelihood that attackers can gain access to mobile devices and then exfiltrate data from those devices. Which of the following is a social-engineering method that, if successful, would MOST likely enable both objectives?

A.
Send an SMS with a spoofed service number including a link to download a malicious application.
A.
Send an SMS with a spoofed service number including a link to download a malicious application.
Answers
B.
Exploit a vulnerability in the MDM and create a new account and device profile.
B.
Exploit a vulnerability in the MDM and create a new account and device profile.
Answers
C.
Perform vishing on the IT help desk to gather a list of approved device IMEIs for masquerading.
C.
Perform vishing on the IT help desk to gather a list of approved device IMEIs for masquerading.
Answers
D.
Infest a website that is often used by employees with malware targeted toward x86 architectures.
D.
Infest a website that is often used by employees with malware targeted toward x86 architectures.
Answers
Suggested answer: A

Explanation:

Since it doesn't indicate company owned devices, sending a text to download an application is best.

And it says social-engineering so a spoofed text falls under that area.

A physical penetration tester needs to get inside an organization's office and collect sensitive information without acting suspiciously or being noticed by the security guards. The tester has observed that the company's ticket gate does not scan the badges, and employees leave their badges on the table while going to the restroom. Which of the following techniques can the tester use to gain physical access to the office? (Choose two.)

A.
Shoulder surfing
A.
Shoulder surfing
Answers
B.
Call spoofing
B.
Call spoofing
Answers
C.
Badge stealing
C.
Badge stealing
Answers
D.
Tailgating
D.
Tailgating
Answers
E.
Dumpster diving
E.
Dumpster diving
Answers
F.
Email phishing
F.
Email phishing
Answers
Suggested answer: C, D

A penetration tester is testing a new version of a mobile application in a sandbox environment. To intercept and decrypt the traffic between the application and the external API, the tester has created a private root CA and issued a certificate from it. Even though the tester installed the root CA into the trusted stone of the smartphone used for the tests, the application shows an error indicating a certificate mismatch and does not connect to the server. Which of the following is the MOST likely reason for the error?

A.
TCP port 443 is not open on the firewall
A.
TCP port 443 is not open on the firewall
Answers
B.
The API server is using SSL instead of TLS
B.
The API server is using SSL instead of TLS
Answers
C.
The tester is using an outdated version of the application
C.
The tester is using an outdated version of the application
Answers
D.
The application has the API certificate pinned.
D.
The application has the API certificate pinned.
Answers
Suggested answer: D

Which of the following concepts defines the specific set of steps and approaches that are conducted during a penetration test?

A.
Scope details
A.
Scope details
Answers
B.
Findings
B.
Findings
Answers
C.
Methodology
C.
Methodology
Answers
D.
Statement of work
D.
Statement of work
Answers
Suggested answer: C

A penetration tester has gained access to the Chief Executive Officer's (CEO's) internal, corporate email. The next objective is to gain access to the network.

Which of the following methods will MOST likely work?

A.
Try to obtain the private key used for S/MIME from the CEO's account.
A.
Try to obtain the private key used for S/MIME from the CEO's account.
Answers
B.
Send an email from the CEO's account, requesting a new account.
B.
Send an email from the CEO's account, requesting a new account.
Answers
C.
Move laterally from the mail server to the domain controller.
C.
Move laterally from the mail server to the domain controller.
Answers
D.
Attempt to escalate privileges on the mail server to gain root access.
D.
Attempt to escalate privileges on the mail server to gain root access.
Answers
Suggested answer: D

A penetration tester needs to perform a vulnerability scan against a web server. Which of the following tools is the tester MOST likely to choose?

A.
Nmap
A.
Nmap
Answers
B.
Nikto
B.
Nikto
Answers
C.
Cain and Abel
C.
Cain and Abel
Answers
D.
Ethercap
D.
Ethercap
Answers
Suggested answer: B

Explanation:

https://hackertarget.com/nikto-website-scanner/

A penetration tester is evaluating a company's network perimeter. The tester has received limited information about defensive controls or countermeasures, and limited internal knowledge of the testing exists. Which of the following should be the FIRST step to plan the reconnaissance activities?

A.
Launch an external scan of netblocks.
A.
Launch an external scan of netblocks.
Answers
B.
Check WHOIS and netblock records for the company.
B.
Check WHOIS and netblock records for the company.
Answers
C.
Use DNS lookups and dig to determine the external hosts.
C.
Use DNS lookups and dig to determine the external hosts.
Answers
D.
Conduct a ping sweep of the company's netblocks.
D.
Conduct a ping sweep of the company's netblocks.
Answers
Suggested answer: C

A penetration tester captured the following traffic during a web-application test:

Which of the following methods should the tester use to visualize the authorization information being transmitted?

A.
Decode the authorization header using UTF-8.
A.
Decode the authorization header using UTF-8.
Answers
B.
Decrypt the authorization header using bcrypt.
B.
Decrypt the authorization header using bcrypt.
Answers
C.
Decode the authorization header using Base64.
C.
Decode the authorization header using Base64.
Answers
D.
Decrypt the authorization header using AES.
D.
Decrypt the authorization header using AES.
Answers
Suggested answer: C

A penetration tester was hired to perform a physical security assessment of an organization's office.

After monitoring the environment for a few hours, the penetration tester notices that some employees go to lunch in a restaurant nearby and leave their belongings unattended on the table while getting food. Which of the following techniques would MOST likely be used to get legitimate access into the organization's building without raising too many alerts?

A.
Tailgating
A.
Tailgating
Answers
B.
Dumpster diving
B.
Dumpster diving
Answers
C.
Shoulder surfing
C.
Shoulder surfing
Answers
D.
Badge cloning
D.
Badge cloning
Answers
Suggested answer: D

A penetration tester wants to find hidden information in documents available on the web at a particular domain. Which of the following should the penetration tester use?

A.
Netcraft
A.
Netcraft
Answers
B.
CentralOps
B.
CentralOps
Answers
C.
Responder
C.
Responder
Answers
D.
FOCA
D.
FOCA
Answers
Suggested answer: D

Explanation:

https://kalilinuxtutorials.com/foca-metadata-hidden-documents/

Total 422 questions
Go to page: of 43