ExamGecko
Home / CompTIA / PT0-002 / List of questions
Ask Question

CompTIA PT0-002 Practice Test - Questions Answers, Page 45

List of questions

Question 441

Report Export Collapse

A penetration tester developed the following script:

bash

Copy code

for ip in $(seq 1 254);

do echo $(echo '192.168.15.$ip ') $(host 192.168.15.$ip dns.company.com | grep 'domain name pointer')

done | grep 'domain name pointer' | cut -d' ' -f1,6

Which of the following best explains the purpose of this script?

Become a Premium Member for full access
  Unlock Premium Member

Question 442

Report Export Collapse

A penetration tester exploits a vulnerable service to gain a shell on a target server. The tester receives the following:

Directory of C:\Users\Guest 05/13/2022 09:23 PM mimikatz.exe 05/18/2022 09:24 PM mimidrv.sys 05/18/2022 09:24 PM mimilib.dll

Which of the following best describes these findings?

Become a Premium Member for full access
  Unlock Premium Member

Question 443

Report Export Collapse

During a penetration test of a server application, a security consultant found that the application randomly crashed or remained stable after opening several simultaneous connections to the application and always submitting the same packets of data. Which of the following is the best sequence of steps the tester should use to understand and exploit the vulnerability?

Become a Premium Member for full access
  Unlock Premium Member

Question 444

Report Export Collapse

Which of the following is the most effective method for ensuring a payload or exploit will run regardless of the operating system version?

Become a Premium Member for full access
  Unlock Premium Member

Question 445

Report Export Collapse

A security analyst is conducting a penetration test for an online store with a database server. Which of the following tools would best assist the tester in detecting vulnerabilities on that server?

Become a Premium Member for full access
  Unlock Premium Member

Question 446

Report Export Collapse

A penetration tester would like to know if any web servers or mail servers are running on the in-scope network segment. Which of the following is the best to use in this scenario?

Become a Premium Member for full access
  Unlock Premium Member

Question 447

Report Export Collapse

During a penetration testing engagement, a penetration tester discovers a buffer overflow vulnerability. Which of the following actions should the tester take to maintain professionalism and integrity?

Become a Premium Member for full access
  Unlock Premium Member

Question 448

Report Export Collapse

A penetration tester has compromised a customer's internal network, gaining access to a file server that hosts email server backups. Which of the following is the best tool to assist with data exfiltration?

Become a Premium Member for full access
  Unlock Premium Member

Question 449

Report Export Collapse

Given the following table:

CompTIA PT0-002 image Question 449 135165 01202025230348000000

Which of the following data structures would most likely be used to store known-good configurations of firewall rules in a Python script?

Become a Premium Member for full access
  Unlock Premium Member

Question 450

Report Export Collapse

Which of the following best explains why a penetration tester would use ProxyChains during an assessment?

Become a Premium Member for full access
  Unlock Premium Member
Total 464 questions
Go to page: of 47
Search

Related questions