CompTIA PT0-002 Practice Test - Questions Answers, Page 23
List of questions
Related questions
Which of the following documents is agreed upon by all parties associated with the penetrationtesting engagement and defines the scope, contacts, costs, duration, and deliverables?
In Python socket programming, SOCK_DGRAM type is:
Which of the following is the MOST important information to have on a penetration testing report that is written for the developers?
After gaining access to a Linux system with a non-privileged account, a penetration tester identifies the following file:
Which of the following actions should the tester perform FIRST?
Which of the following types of assessments MOST likely focuses on vulnerabilities with the objective to access specific data?
A penetration tester initiated the transfer of a large data set to verify a proof-of-concept attack as permitted by the ROE. The tester noticed the client's data included PII, which is out of scope, and immediately stopped the transfer. Which of the following MOST likely explains the penetration tester's decision?
A penetration tester exploited a vulnerability on a server and remotely ran a payload to gain a shell.
However, a connection was not established, and no errors were shown on the payload execution. The penetration tester suspected that a network device, like an IPS or next-generation firewall, was dropping the connection. Which of the following payloads are MOST likely to establish a shell successfully?
A penetration tester has been hired to examine a website for flaws. During one of the time windows for testing, a network engineer notices a flood of GET requests to the web server, reducing the website's response time by 80%. The network engineer contacts the penetration tester to determine if these GET requests are part of the test. Which of the following BEST describes the purpose of checking with the penetration tester?
Which of the following is the BEST resource for obtaining payloads against specific network infrastructure products?
A penetration tester gives the following command to a systems administrator to execute on one of the target servers:
rm -f /var/www/html/G679h32gYu.php
Which of the following BEST explains why the penetration tester wants this command executed?
Question