ExamGecko
Home Home / CompTIA / PT0-002

CompTIA PT0-002 Practice Test - Questions Answers, Page 21

Question list
Search
Search

List of questions

Search

Related questions











A company uses a cloud provider with shared network bandwidth to host a web application on dedicated servers. The company's contact with the cloud provider prevents any activities that would interfere with the cloud provider's other customers. When engaging with a penetration-testing company to test the application, which of the following should the company avoid?

A.
Crawling the web application's URLs looking for vulnerabilities
A.
Crawling the web application's URLs looking for vulnerabilities
Answers
B.
Fingerprinting all the IP addresses of the application's servers
B.
Fingerprinting all the IP addresses of the application's servers
Answers
C.
Brute forcing the application's passwords
C.
Brute forcing the application's passwords
Answers
D.
Sending many web requests per second to test DDoS protection
D.
Sending many web requests per second to test DDoS protection
Answers
Suggested answer: D

A penetration tester is cleaning up and covering tracks at the conclusion of a penetration test. Which of the following should the tester be sure to remove from the system? (Choose two.)

A.
Spawned shells
A.
Spawned shells
Answers
B.
Created user accounts
B.
Created user accounts
Answers
C.
Server logs
C.
Server logs
Answers
D.
Administrator accounts
D.
Administrator accounts
Answers
E.
Reboot system
E.
Reboot system
Answers
F.
ARP cache
F.
ARP cache
Answers
Suggested answer: A, B

Explanation:

Removing shells: Remove any shell programs installed when performing the pentest.

Removing tester-created credentials: Be sure to remove any user accounts created during the pentest. This includes backdoor accounts.

Removing tools: Remove any software tools that were installed on the customer's systems that were used to aid in the exploitation of systems.

During the scoping phase of an assessment, a client requested that any remote code exploits discovered during testing would be reported immediately so the vulnerability could be fixed as soon as possible. The penetration tester did not agree with this request, and after testing began, the tester discovered a vulnerability and gained internal access to the system. Additionally, this scenario led to a loss of confidential credit card data and a hole in the system. At the end of the test, the penetration tester willfully failed to report this information and left the vulnerability in place. A few months later, the client was breached and credit card data was stolen. After being notified about the breach, which of the following steps should the company take NEXT?

A.
Deny that the vulnerability existed
A.
Deny that the vulnerability existed
Answers
B.
Investigate the penetration tester.
B.
Investigate the penetration tester.
Answers
C.
Accept that the client was right.
C.
Accept that the client was right.
Answers
D.
Fire the penetration tester.
D.
Fire the penetration tester.
Answers
Suggested answer: B

Explanation:

The penetration tester violated the client's request and the code of ethics by not reporting the vulnerability immediately and leaving it in place. This could have contributed to the breach and the data loss. The company should investigate the penetration tester's actions and motives, and hold them accountable for any negligence or malpractice.

A penetration tester is contracted to attack an oil rig network to look for vulnerabilities. While conducting the assessment, the support organization of the rig reported issues connecting to corporate applications and upstream services for data acquisitions. Which of the following is the MOST likely culprit?

A.
Patch installations
A.
Patch installations
Answers
B.
Successful exploits
B.
Successful exploits
Answers
C.
Application failures
C.
Application failures
Answers
D.
Bandwidth limitations
D.
Bandwidth limitations
Answers
Suggested answer: B

Explanation:

Successful exploits could cause network disruptions, service outages, or data corruption, which could affect the connectivity and functionality of the oil rig network. Patch installations, application failures, and bandwidth limitations are less likely to be related to the penetration testing activities.

A penetration tester was contracted to test a proprietary application for buffer overflow vulnerabilities. Which of the following tools would be BEST suited for this task?

A.
GDB
A.
GDB
Answers
B.
Burp Suite
B.
Burp Suite
Answers
C.
SearchSpliot
C.
SearchSpliot
Answers
D.
Netcat
D.
Netcat
Answers
Suggested answer: A

Explanation:

GDB is a debugging tool that can be used to analyze and manipulate the memory of a running process, which is useful for finding and exploiting buffer overflow vulnerabilities. Burp Suite is a web application testing tool that does not directly test for buffer overflows. SearchSpliot is a database of known exploits that does not test for new vulnerabilities. Netcat is a network utility that can be used to send and receive data, but not to test for buffer overflows.

Which of the following would assist a penetration tester the MOST when evaluating the susceptibility of top-level executives to social engineering attacks?

A.
Scraping social media for personal details
A.
Scraping social media for personal details
Answers
B.
Registering domain names that are similar to the target company's
B.
Registering domain names that are similar to the target company's
Answers
C.
Identifying technical contacts at the company
C.
Identifying technical contacts at the company
Answers
D.
Crawling the company's website for company information
D.
Crawling the company's website for company information
Answers
Suggested answer: A

Explanation:

Scraping social media for personal details can help a penetration tester craft personalized and convincing social engineering attacks against top-level executives, who may share sensitive or confidential information on their profiles. Registering domain names that are similar to the target company's can be used for phishing or typosquatting attacks, but not specifically against executives. Identifying technical contacts at the company can help with reconnaissance, but not with social engineering. Crawling the company's website for company information can provide general background knowledge, but not specific details about executives.

A penetration tester is testing a new API for the company's existing services and is preparing the following script:

Which of the following would the test discover?

A.
Default web configurations
A.
Default web configurations
Answers
B.
Open web ports on a host
B.
Open web ports on a host
Answers
C.
Supported HTTP methods
C.
Supported HTTP methods
Answers
D.
Listening web servers in a domain
D.
Listening web servers in a domain
Answers
Suggested answer: C

Explanation:

The script is using the requests library to send an OPTIONS request to the API endpoint, which returns a list of supported HTTP methods for that resource. This can help the penetration tester to identify potential attack vectors or vulnerabilities based on the methods allowed.

Given the following script:

Which of the following BEST characterizes the function performed by lines 5 and 6?

A.
Retrieves the start-of-authority information for the zone on DNS server 10.10.10.10
A.
Retrieves the start-of-authority information for the zone on DNS server 10.10.10.10
Answers
B.
Performs a single DNS query for www.comptia.org and prints the raw data output
B.
Performs a single DNS query for www.comptia.org and prints the raw data output
Answers
C.
Loops through variable b to count the results returned for the DNS query and prints that count to screen
C.
Loops through variable b to count the results returned for the DNS query and prints that count to screen
Answers
D.
Prints each DNS query result already stored in variable b
D.
Prints each DNS query result already stored in variable b
Answers
Suggested answer: D

Explanation:

The script is using the scapy library to perform a DNS query for www.comptia.org and store the response in variable b. Lines 5 and 6 are using a for loop to iterate over each answer in variable b and print its summary to the screen. This can help the penetration tester to view the DNS records returned by the query.

A penetration-testing team needs to test the security of electronic records in a company's office. Per the terms of engagement, the penetration test is to be conducted after hours and should not include circumventing the alarm or performing destructive entry. During outside reconnaissance, the team sees an open door from an adjoining building. Which of the following would be allowed under the terms of the engagement?

A.
Prying the lock open on the records room
A.
Prying the lock open on the records room
Answers
B.
Climbing in an open window of the adjoining building
B.
Climbing in an open window of the adjoining building
Answers
C.
Presenting a false employee ID to the night guard
C.
Presenting a false employee ID to the night guard
Answers
D.
Obstructing the motion sensors in the hallway of the records room
D.
Obstructing the motion sensors in the hallway of the records room
Answers
Suggested answer: B

Explanation:

The terms of engagement state that the penetration test should not include circumventing the alarm or performing destructive entry, which rules out options A and D. Option C is also not allowed, as it involves social engineering, which is not part of the scope. Option B is the only one that does not violate the terms of engagement, as it uses an open door from an adjoining building to gain access to the records room. This can help the penetration tester to test the physical security of the electronic records without breaking any rules.

A penetration tester who is working remotely is conducting a penetration test using a wireless connection. Which of the following is the BEST way to provide confidentiality for the client while using this connection?

A.
Configure wireless access to use a AAA server.
A.
Configure wireless access to use a AAA server.
Answers
B.
Use random MAC addresses on the penetration testing distribution.
B.
Use random MAC addresses on the penetration testing distribution.
Answers
C.
Install a host-based firewall on the penetration testing distribution.
C.
Install a host-based firewall on the penetration testing distribution.
Answers
D.
Connect to the penetration testing company's VPS using a VPN.
D.
Connect to the penetration testing company's VPS using a VPN.
Answers
Suggested answer: D

Explanation:

The best way to provide confidentiality for the client while using a wireless connection is to connect to the penetration testing company's VPS using a VPN. This will encrypt the traffic between the penetration tester and the VPS, and prevent any eavesdropping or interception by third parties. A VPN will also allow the penetration tester to access the client's network securely and bypass any firewall or network restrictions.

Total 422 questions
Go to page: of 43