ExamGecko
Home / CompTIA / PT0-002 / List of questions
Ask Question

CompTIA PT0-002 Practice Test - Questions Answers, Page 40

Add to Whishlist

List of questions

Question 391

Report Export Collapse

A penetration tester captures SMB network traffic and discovers that users are mistyping the name of a fileshare server. This causes the workstations to send out requests attempting to resolve the fileshare server's name. Which of the following is the best way for a penetration tester to exploit this situation?

Become a Premium Member for full access
  Unlock Premium Member

Question 392

Report Export Collapse

During a security assessment of a web application, a penetration tester was able to generate the following application response:

Unclosed quotation mark after the character string Incorrect syntax near '.

Which of the following is the most probable finding?

Become a Premium Member for full access
  Unlock Premium Member

Question 393

Report Export Collapse

A penetration tester uses Hashcat to crack hashes discovered during a penetration test and obtains the following output:

ad09cd16529b5f5a40a3e15344e57649f4a43a267a97f008af01af803603c4c8 : Summer2023 !!

7945bb2bb08731fc8d57680ffa4aefec91c784d231de029c610b778eda5ef48b:p@ssWord123

ea88ceab69cb2fb8bdcf9ef4df884af219fffbffab473ec13f20326dc6f84d13: Love-You999

Which of the following is the best way to remediate the penetration tester's discovery?

Become a Premium Member for full access
  Unlock Premium Member

Question 394

Report Export Collapse

Which of the following tools provides Python classes for interacting with network protocols?

Become a Premium Member for full access
  Unlock Premium Member

Question 395

Report Export Collapse

After successfully compromising a remote host, a security consultant notices an endpoint protection software is running on the host. Which of the following commands would be best for the consultant to use to terminate the protection software and its child processes?

Become a Premium Member for full access
  Unlock Premium Member

Question 396

Report Export Collapse

An organization's Chief Information Security Officer debates the validity of a critical finding from a penetration assessment that was completed six months ago. Which of the following post-report delivery activities would have most likely prevented this scenario?

Become a Premium Member for full access
  Unlock Premium Member

Question 397

Report Export Collapse

A penetration testing firm wants to hire three additional consultants to support a newly signed long-term contract with a major customer. The following is a summary of candidate background checks:

CompTIA PT0-002 image Question 397 97526 10022024175321000000

Which of the following candidates should most likely be excluded from consideration?

Become a Premium Member for full access
  Unlock Premium Member

Question 398

Report Export Collapse

During a security assessment, a penetration tester decides to write the following Python script: import requests

x= ['OPTIONS', 'TRACE', 'TEST'l

for y in x;

z - requests.request(y, 'http://server.net')

print(y, z.status_code, z.reason)

Which of the following is the penetration tester trying to accomplish? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 399

Report Export Collapse

Which of the following documents should be consulted if a client has an issue accepting a penetration test report that was provided?

Become a Premium Member for full access
  Unlock Premium Member

Question 400

Report Export Collapse

After obtaining a reverse shell connection, a penetration tester runs the following command: www-data@server!2:sudo -1

User www-data may run the following commands on serverl2: (root) NOPASSWD: /usr/bin/vi

Which of the following is the fastest way to escalate privileges on this server?

Become a Premium Member for full access
  Unlock Premium Member
Total 464 questions
Go to page: of 47
Search

Related questions