ExamGecko
Home / CompTIA / PT0-002 / List of questions
Ask Question

CompTIA PT0-002 Practice Test - Questions Answers, Page 20

Add to Whishlist

List of questions

Question 191

Report Export Collapse

A penetration tester gains access to a system and is able to migrate to a user process:

CompTIA PT0-002 image Question 191 97320 10022024175321000000

Given the output above, which of the following actions is the penetration tester performing?

(Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 192

Report Export Collapse

After gaining access to a previous system, a penetration tester runs an Nmap scan against a network with the following results:

CompTIA PT0-002 image Question 192 97321 10022024175321000000

The tester then runs the following command from the previous exploited system, which fails:

Which of the following explains the reason why the command failed?

Become a Premium Member for full access
  Unlock Premium Member

Question 193

Report Export Collapse

Which of the following assessment methods is MOST likely to cause harm to an ICS environment?

Become a Premium Member for full access
  Unlock Premium Member

Question 194

Report Export Collapse

During a penetration test, a tester is in close proximity to a corporate mobile device belonging to a network administrator that is broadcasting Bluetooth frames.

Which of the following is an example of a Bluesnarfing attack that the penetration tester can perform?

Become a Premium Member for full access
  Unlock Premium Member

Question 195

Report Export Collapse

A software company has hired a security consultant to assess the security of the company's software development practices. The consultant opts to begin reconnaissance by performing fuzzing on a software binary. Which of the following vulnerabilities is the security consultant MOST likely to identify?

Become a Premium Member for full access
  Unlock Premium Member

Question 196

Report Export Collapse

A penetration tester has prepared the following phishing email for an upcoming penetration test:

CompTIA PT0-002 image Question 196 97325 10022024175321000000

Which of the following is the penetration tester using MOST to influence phishing targets to click on the link?

Become a Premium Member for full access
  Unlock Premium Member

Question 197

Report Export Collapse

During a penetration test, a tester is able to change values in the URL from example.com/login.php?id=5 to example.com/login.php?id=10 and gain access to a web application.

Which of the following vulnerabilities has the penetration tester exploited?

Become a Premium Member for full access
  Unlock Premium Member

Question 198

Report Export Collapse

Which of the following situations would MOST likely warrant revalidation of a previous security assessment?

Become a Premium Member for full access
  Unlock Premium Member

Question 199

Report Export Collapse

A penetration tester downloaded a Java application file from a compromised web server and identifies how to invoke it by looking at the following log:

CompTIA PT0-002 image Question 199 97328 10022024175321000000

Which of the following is the order of steps the penetration tester needs to follow to validate whether the Java application uses encryption over sockets?

Become a Premium Member for full access
  Unlock Premium Member

Question 200

Report Export Collapse

When planning a penetration-testing effort, clearly expressing the rules surrounding the optimal time of day for test execution is important because:

Become a Premium Member for full access
  Unlock Premium Member
Total 464 questions
Go to page: of 47
Search

Related questions