ExamGecko
Home / CompTIA / PT0-002 / List of questions
Ask Question

CompTIA PT0-002 Practice Test - Questions Answers, Page 42

Add to Whishlist

List of questions

Question 411

Report Export Collapse

During an engagement, a junior penetration tester found a multihomed host that led to an unknown network segment. The penetration tester ran a port scan against the network segment, which caused an outage at the customer's factory. Which of the following documents should the junior penetration tester most likely follow to avoid this issue in the future?

Become a Premium Member for full access
  Unlock Premium Member

Question 412

Report Export Collapse

A penetration tester is performing an assessment for an organization and must gather valid user credentials. Which of the following attacks would be best for the tester to use to achieve this objective?

Become a Premium Member for full access
  Unlock Premium Member

Question 413

Report Export Collapse

After successfully compromising a remote host, a security consultant notices an endpoint protection software is running on the host. Which of the following commands would be best for the consultant to use to terminate the protection software and its child processes?

Become a Premium Member for full access
  Unlock Premium Member

Question 414

Report Export Collapse

A penetration tester is performing an assessment of an application that allows users to upload documents to a cloud-based file server for easy access anywhere in the world. Which of the following would most likely allow a tester to access unintentionally exposed documents?

Become a Premium Member for full access
  Unlock Premium Member

Question 415

Report Export Collapse

Which of the following is the most important to include in the scope of a wireless security assessment?

Become a Premium Member for full access
  Unlock Premium Member

Question 416

Report Export Collapse

As part of active reconnaissance, penetration testers need to determine whether a protection mechanism is in place to safeguard the target's website against web application attacks. Which of the following methods would be the most suitable?

Become a Premium Member for full access
  Unlock Premium Member

Question 417

Report Export Collapse

During an assessment, a penetration tester found an application with the default credentials enabled. Which of the following best describes the technical control required to fix this issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 418

Report Export Collapse

A penetration tester was able to gain access to a plaintext file on a user workstation. Upon opening the file, the tester notices some strings of randomly generated text. The tester is able to use these strings to move laterally throughout the network by accessing the fileshare on a web application. Which of the following should the organization do to remediate the issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 419

Report Export Collapse

A penetration tester is hired to test a client's systems. The client's systems are hosted by the client at its headquarters. The production environment is hosted by a private cloud-hosting company. Which of the following would be the most important for the penetration tester to determine before beginning the test?

Become a Premium Member for full access
  Unlock Premium Member

Question 420

Report Export Collapse

Which of the following is a ROE component that provides a penetration tester with guidance on who and how to contact the necessary individuals in the event of a disaster during an engagement?

Become a Premium Member for full access
  Unlock Premium Member
Total 464 questions
Go to page: of 47
Search

Related questions