ExamGecko
Home / CompTIA / PT0-002 / List of questions
Ask Question

CompTIA PT0-002 Practice Test - Questions Answers, Page 37

Add to Whishlist

List of questions

Question 361

Report Export Collapse

A penetration tester issues the following command after obtaining a low-privilege reverse shell: wmic service get name,pathname,startmode

Which of the following is the most likely reason the penetration tester ran this command?

Become a Premium Member for full access
  Unlock Premium Member

Question 362

Report Export Collapse

Which of the following tools can a penetration tester use to brute force a user password over SSH using multiple threads?

Become a Premium Member for full access
  Unlock Premium Member

Question 363

Report Export Collapse

A penetration tester is taking screen captures of hashes obtained from a domain controller. Which of the following best explains why the penetration tester should immediately obscure portions of the images before saving?

Become a Premium Member for full access
  Unlock Premium Member

Question 364

Report Export Collapse

Which of the following types of information would most likely be included in an application security assessment report addressed to developers? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 365

Report Export Collapse

A penetration tester is conducting an assessment for an e-commerce company and successfully copies the user database to the local machine. After a closer review, the penetration tester identifies several high-profile celebrities who have active user accounts with the online service. Which of the following is the most appropriate next step?

Become a Premium Member for full access
  Unlock Premium Member

Question 366

Report Export Collapse

A penetration tester is reviewing the logs of a proxy server and discovers the following URLs:

https://test.comptia.com/profile.php?userid=1546

https://test.cpmptia.com/profile.php?userid=5482

https://test.comptia.com/profile.php?userid=3618

Which of the following types of vulnerabilities should be remediated?

Become a Premium Member for full access
  Unlock Premium Member

Question 367

Report Export Collapse

Given the following user-supplied data:

www.comptia.com/info.php?id=1 AND 1=1

Which of the following attack techniques is the penetration tester likely implementing?

Become a Premium Member for full access
  Unlock Premium Member

Question 368

Report Export Collapse

A penetration tester is conducting an assessment of an organization that has both a web and mobile application. While testing the user profile page, the penetration tester notices that additional data is returned in the API response, which is not displayed in the web user interface. Which of the following is the most effective technique to extract sensitive user data?

Become a Premium Member for full access
  Unlock Premium Member

Question 369

Report Export Collapse

During an assessment, a penetration tester discovers the following code sample in a web application:

'(&(userid=*)(userid=*))(I(userid=*)(userPwd=(SHAl}a9993e364706816aba3e25717850c26c9cd0d89d==))

Which of the following injections is being performed?

Become a Premium Member for full access
  Unlock Premium Member

Question 370

Report Export Collapse

Which of the following tools would be best to use to conceal data in various kinds of image files?

Become a Premium Member for full access
  Unlock Premium Member
Total 464 questions
Go to page: of 47
Search

Related questions