ExamGecko
Home / CompTIA / PT0-002 / List of questions
Ask Question

CompTIA PT0-002 Practice Test - Questions Answers, Page 24

Add to Whishlist

List of questions

Question 231

Report Export Collapse

The following PowerShell snippet was extracted from a log of an attacker machine:

CompTIA PT0-002 image Question 231 97360 10022024175321000000

A penetration tester would like to identify the presence of an array. Which of the following line numbers would define the array?

Become a Premium Member for full access
  Unlock Premium Member

Question 232

Report Export Collapse

A company provided the following network scope for a penetration test:

169.137.1.0/24

221.10.1.0/24

149.14.1.0/24

A penetration tester discovered a remote command injection on IP address 149.14.1.24 and exploited the system. Later, the tester learned that this particular IP address belongs to a third party.

Which of the following stakeholders is responsible for this mistake?

Become a Premium Member for full access
  Unlock Premium Member

Question 233

Report Export Collapse

During the reconnaissance phase, a penetration tester obtains the following output:

Reply from 192.168.1.23: bytes=32 time<54ms TTL=128

Reply from 192.168.1.23: bytes=32 time<53ms TTL=128

Reply from 192.168.1.23: bytes=32 time<60ms TTL=128

Reply from 192.168.1.23: bytes=32 time<51ms TTL=128

Which of the following operating systems is MOST likely installed on the host?

Become a Premium Member for full access
  Unlock Premium Member

Question 234

Report Export Collapse

A penetration tester joins the assessment team in the middle of the assessment. The client has asked the team, both verbally and in the scoping document, not to test the production networks. However, the new tester is not aware of this request and proceeds to perform exploits in the production environment. Which of the following would have MOST effectively prevented this misunderstanding?

Become a Premium Member for full access
  Unlock Premium Member

Question 235

Report Export Collapse

A penetration tester attempted a DNS poisoning attack. After the attempt, no traffic was seen from the target machine. Which of the following MOST likely caused the attack to fail?

Become a Premium Member for full access
  Unlock Premium Member

Question 236

Report Export Collapse

During an assessment, a penetration tester was able to access the organization's wireless network from outside of the building using a laptop running Aircrack-ng. Which of the following should be recommended to the client to remediate this issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 237

Report Export Collapse

A penetration tester is conducting a penetration test and discovers a vulnerability on a web server that is owned by the client. Exploiting the vulnerability allows the tester to open a reverse shell.

Enumerating the server for privilege escalation, the tester discovers the following:

CompTIA PT0-002 image Question 237 97366 10022024175321000000

Which of the following should the penetration tester do NEXT?

Become a Premium Member for full access
  Unlock Premium Member

Question 238

Report Export Collapse

A penetration tester successfully performed an exploit on a host and was able to hop from VLAN 100 to VLAN 200. VLAN 200 contains servers that perform financial transactions, and the penetration tester now wants the local interface of the attacker machine to have a static ARP entry in the local cache. The attacker machine has the following:

IP Address: 192.168.1.63

Physical Address: 60-36-dd-a6-c5-33

Which of the following commands would the penetration tester MOST likely use in order to establish a static ARP entry successfully?

Become a Premium Member for full access
  Unlock Premium Member

Question 239

Report Export Collapse

During an internal penetration test against a company, a penetration tester was able to navigate to another part of the network and locate a folder containing customer information such as addresses, phone numbers, and credit card numbers. To be PCI compliant, which of the following should the company have implemented to BEST protect this data?

Become a Premium Member for full access
  Unlock Premium Member

Question 240

Report Export Collapse

A security analyst needs to perform a scan for SMB port 445 over a/16 network. Which of the following commands would be the BEST option when stealth is not a concern and the task is time sensitive?

Become a Premium Member for full access
  Unlock Premium Member
Total 464 questions
Go to page: of 47
Search

Related questions