ExamGecko
Home / CompTIA / PT0-002 / List of questions
Ask Question

CompTIA PT0-002 Practice Test - Questions Answers, Page 31

Add to Whishlist

List of questions

Question 301

Report Export Collapse

Using the output, identify potential attack vectors that should be further investigated.

CompTIA PT0-002 image Question 301 97430 10022024175321000000

CompTIA PT0-002 image Question 301 97430 10022024175321000000

CompTIA PT0-002 image Question 301 97430 10022024175321000000

CompTIA PT0-002 image Question 301 97430 10022024175321000000

CompTIA PT0-002 image Question 301 97430 10022024175321000000

Become a Premium Member for full access
  Unlock Premium Member

Question 302

Report Export Collapse

During an assessment, a penetration tester inspected a log and found a series of thousands of requests coming from a single IP address to the same URL. A few of the requests are listed below.

CompTIA PT0-002 image Question 302 97431 10022024175321000000

Which of the following vulnerabilities was the attacker trying to exploit?

Become a Premium Member for full access
  Unlock Premium Member

Question 303

Report Export Collapse

ion tester is attempting to get more people from a target company to download and run an executable. Which of the following would be the.. :tive way for the tester to achieve this objective?

Become a Premium Member for full access
  Unlock Premium Member

Question 304

Report Export Collapse

Which of the following tools would be best suited to perform a cloud security assessment?

Become a Premium Member for full access
  Unlock Premium Member

Question 305

Report Export Collapse

Penetration tester is developing exploits to attack multiple versions of a common software package.

The versions have different menus and )ut.. they have a common log-in screen that the exploit must use. The penetration tester develops code to perform the log-in that can be each of the exploits targeted to a specific version. Which of the following terms is used to describe this common log-in code example?

Become a Premium Member for full access
  Unlock Premium Member

Question 306

Report Export Collapse

Which of the following documents describes activities that are prohibited during a scheduled penetration test?

Become a Premium Member for full access
  Unlock Premium Member

Question 307

Report Export Collapse

Penetration tester who was exclusively authorized to conduct a physical assessment noticed there were no cameras pointed at the dumpster for company. The penetration tester returned at night and collected garbage that contained receipts for recently purchased networking :. The models of equipment purchased are vulnerable to attack. Which of the following is the most likely next step for the penetration?

Become a Premium Member for full access
  Unlock Premium Member

Question 308

Report Export Collapse

Penetration on an assessment for a client organization, a penetration tester notices numerous outdated software package versions were installed ...s-critical servers. Which of the following would best mitigate this issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 309

Report Export Collapse

Given the following Nmap scan command:

[root@kali ~]# nmap 192.168.0 .* -- exclude 192.168.0.101


Which of the following is the total number of servers that Nmap will attempt to scan?

Become a Premium Member for full access
  Unlock Premium Member

Question 310

Report Export Collapse

A penetration tester is conducting an assessment on 192.168.1.112. Given the following output:

CompTIA PT0-002 image Question 310 97439 10022024175321000000

Which of the following is the penetration tester conducting?

Become a Premium Member for full access
  Unlock Premium Member
Total 464 questions
Go to page: of 47
Search

Related questions