ExamGecko
Home / CompTIA / PT0-002 / List of questions
Ask Question

CompTIA PT0-002 Practice Test - Questions Answers, Page 27

Add to Whishlist

List of questions

Question 261

Report Export Collapse

Given the following code:

CompTIA PT0-002 image Question 261 97390 10022024175321000000

Which of the following data structures is systems?

Become a Premium Member for full access
  Unlock Premium Member

Question 262

Report Export Collapse

A penetration tester who is performing an engagement notices a specific host is vulnerable to EternalBlue. Which of the following would BEST protect against this vulnerability?

Become a Premium Member for full access
  Unlock Premium Member

Question 263

Report Export Collapse

The delivery of a penetration test within an organization requires defining specific parameters regarding the nature and types of exercises that can be conducted and when they can be conducted.

Which of the following BEST identifies this concept?

Become a Premium Member for full access
  Unlock Premium Member

Question 264

Report Export Collapse

A penetration tester has extracted password hashes from the lsass.exe memory process. Which of the following should the tester perform NEXT to pass the hash and provide persistence with the newly acquired credentials?

Become a Premium Member for full access
  Unlock Premium Member

Question 265

Report Export Collapse

The output from a penetration testing tool shows 100 hosts contained findings due to improper patch management. Which of the following did the penetration tester perform?

Become a Premium Member for full access
  Unlock Premium Member

Question 266

Report Export Collapse

After running the enum4linux.pl command, a penetration tester received the following output:

CompTIA PT0-002 image Question 266 97395 10022024175321000000

Which of the following commands should the penetration tester run NEXT?

Become a Premium Member for full access
  Unlock Premium Member

Question 267

Report Export Collapse

During an assessment, a penetration tester gathered OSINT for one of the IT systems administrators from the target company and managed to obtain valuable information, including corporate email addresses. Which of the following techniques should the penetration tester perform NEXT?

Become a Premium Member for full access
  Unlock Premium Member

Question 268

Report Export Collapse

A penetration tester examines a web-based shopping catalog and discovers the following URL when viewing a product in the catalog:

http://company.com/catalog.asp?productid=22

The penetration tester alters the URL in the browser to the following and notices a delay when the page refreshes:

http://company.com/catalog.asp?productid=22;WAITFOR DELAY'00:00:05'

Which of the following should the penetration tester attempt NEXT?

Become a Premium Member for full access
  Unlock Premium Member

Question 269

Report Export Collapse

For a penetration test engagement, a security engineer decides to impersonate the IT help desk. The security engineer sends a phishing email containing an urgent request for users to change their passwords and a link to https://example.com/index.html. The engineer has designed the attack so that once the users enter the credentials, the index.html page takes the credentials and then forwards them to another server that the security engineer is controlling. Given the following information:

CompTIA PT0-002 image Question 269 97398 10022024175321000000

Which of the following lines of code should the security engineer add to make the attack successful?

Become a Premium Member for full access
  Unlock Premium Member

Question 270

Report Export Collapse

A penetration tester is conducting an assessment against a group of publicly available web servers and notices a number of TCP resets returning from one of the web servers. Which of the following is MOST likely causing the TCP resets to occur during the assessment?

Become a Premium Member for full access
  Unlock Premium Member
Total 464 questions
Go to page: of 47
Search

Related questions