ExamGecko
Home / CompTIA / PT0-002 / List of questions
Ask Question

CompTIA PT0-002 Practice Test - Questions Answers, Page 21

Add to Whishlist

List of questions

Question 201

Report Export Collapse

A company uses a cloud provider with shared network bandwidth to host a web application on dedicated servers. The company's contact with the cloud provider prevents any activities that would interfere with the cloud provider's other customers. When engaging with a penetration-testing company to test the application, which of the following should the company avoid?

Become a Premium Member for full access
  Unlock Premium Member

Question 202

Report Export Collapse

A penetration tester is cleaning up and covering tracks at the conclusion of a penetration test. Which of the following should the tester be sure to remove from the system? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 203

Report Export Collapse

During the scoping phase of an assessment, a client requested that any remote code exploits discovered during testing would be reported immediately so the vulnerability could be fixed as soon as possible. The penetration tester did not agree with this request, and after testing began, the tester discovered a vulnerability and gained internal access to the system. Additionally, this scenario led to a loss of confidential credit card data and a hole in the system. At the end of the test, the penetration tester willfully failed to report this information and left the vulnerability in place. A few months later, the client was breached and credit card data was stolen. After being notified about the breach, which of the following steps should the company take NEXT?

Become a Premium Member for full access
  Unlock Premium Member

Question 204

Report Export Collapse

A penetration tester is contracted to attack an oil rig network to look for vulnerabilities. While conducting the assessment, the support organization of the rig reported issues connecting to corporate applications and upstream services for data acquisitions. Which of the following is the MOST likely culprit?

Become a Premium Member for full access
  Unlock Premium Member

Question 205

Report Export Collapse

A penetration tester was contracted to test a proprietary application for buffer overflow vulnerabilities. Which of the following tools would be BEST suited for this task?

Become a Premium Member for full access
  Unlock Premium Member

Question 206

Report Export Collapse

Which of the following would assist a penetration tester the MOST when evaluating the susceptibility of top-level executives to social engineering attacks?

Become a Premium Member for full access
  Unlock Premium Member

Question 207

Report Export Collapse

A penetration tester is testing a new API for the company's existing services and is preparing the following script:

CompTIA PT0-002 image Question 207 97336 10022024175321000000

Which of the following would the test discover?

Become a Premium Member for full access
  Unlock Premium Member

Question 208

Report Export Collapse

Given the following script:

CompTIA PT0-002 image Question 208 97337 10022024175321000000

Which of the following BEST characterizes the function performed by lines 5 and 6?

Become a Premium Member for full access
  Unlock Premium Member

Question 209

Report Export Collapse

A penetration-testing team needs to test the security of electronic records in a company's office. Per the terms of engagement, the penetration test is to be conducted after hours and should not include circumventing the alarm or performing destructive entry. During outside reconnaissance, the team sees an open door from an adjoining building. Which of the following would be allowed under the terms of the engagement?

Become a Premium Member for full access
  Unlock Premium Member

Question 210

Report Export Collapse

A penetration tester who is working remotely is conducting a penetration test using a wireless connection. Which of the following is the BEST way to provide confidentiality for the client while using this connection?

Become a Premium Member for full access
  Unlock Premium Member
Total 464 questions
Go to page: of 47
Search

Related questions