ExamGecko
Home / CompTIA / PT0-002 / List of questions
Ask Question

CompTIA PT0-002 Practice Test - Questions Answers, Page 25

Add to Whishlist

List of questions

Question 241

Report Export Collapse

Penetration tester has discovered an unknown Linux 64-bit executable binary. Which of the following tools would be BEST to use to analyze this issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 242

Report Export Collapse

A penetration tester found several critical SQL injection vulnerabilities during an assessment of a client's system. The tester would like to suggest mitigation to the client as soon as possible.

Which of the following remediation techniques would be the BEST to recommend? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 243

Report Export Collapse

Which of the following is a rules engine for managing public cloud accounts and resources?

Become a Premium Member for full access
  Unlock Premium Member

Question 244

Report Export Collapse

A penetration tester will be performing a vulnerability scan as part of the penetration test on a client's website. The tester plans to run several Nmap scripts that probe for vulnerabilities while avoiding detection. Which of the following Nmap options will the penetration tester MOST likely utilize?

Become a Premium Member for full access
  Unlock Premium Member

Question 245

Report Export Collapse

A penetration tester discovered that a client uses cloud mail as the company's email system. During the penetration test, the tester set up a fake cloud mail login page and sent all company employees an email that stated their inboxes were full and directed them to the fake login page to remedy the issue. Which of the following BEST describes this attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 246

Report Export Collapse

During an assessment, a penetration tester obtains a list of 30 email addresses by crawling the target company's website and then creates a list of possible usernames based on the email address format.

Which of the following types of attacks would MOST likely be used to avoid account lockout?

Become a Premium Member for full access
  Unlock Premium Member

Question 247

Report Export Collapse

Which of the following tools should a penetration tester use to crawl a website and build a wordlist using the data recovered to crack the password on the website?

Become a Premium Member for full access
  Unlock Premium Member

Question 248

Report Export Collapse

An exploit developer is coding a script that submits a very large number of small requests to a web server until the server is compromised. The script must examine each response received and compare the data to a large number of strings to determine which data to submit next. Which of the following data structures should the exploit developer use to make the string comparison and determination as efficient as possible?

Become a Premium Member for full access
  Unlock Premium Member

Question 249

Report Export Collapse

Which of the following BEST explains why a penetration tester cannot scan a server that was previously scanned successfully?

Become a Premium Member for full access
  Unlock Premium Member

Question 250

Report Export Collapse

A security analyst needs to perform an on-path attack on BLE smart devices. Which of the following tools would be BEST suited to accomplish this task?

Become a Premium Member for full access
  Unlock Premium Member
Total 464 questions
Go to page: of 47
Search

Related questions