CompTIA PT0-002 Practice Test - Questions Answers, Page 45
List of questions
Question 441

A penetration tester developed the following script:
bash
Copy code
for ip in $(seq 1 254);
do echo $(echo '192.168.15.$ip ') $(host 192.168.15.$ip dns.company.com | grep 'domain name pointer')
done | grep 'domain name pointer' | cut -d' ' -f1,6
Which of the following best explains the purpose of this script?
Question 442

A penetration tester exploits a vulnerable service to gain a shell on a target server. The tester receives the following:
Directory of C:\Users\Guest 05/13/2022 09:23 PM mimikatz.exe 05/18/2022 09:24 PM mimidrv.sys 05/18/2022 09:24 PM mimilib.dll
Which of the following best describes these findings?
Question 443

During a penetration test of a server application, a security consultant found that the application randomly crashed or remained stable after opening several simultaneous connections to the application and always submitting the same packets of data. Which of the following is the best sequence of steps the tester should use to understand and exploit the vulnerability?
Question 444

Which of the following is the most effective method for ensuring a payload or exploit will run regardless of the operating system version?
Question 445

A security analyst is conducting a penetration test for an online store with a database server. Which of the following tools would best assist the tester in detecting vulnerabilities on that server?
Question 446

A penetration tester would like to know if any web servers or mail servers are running on the in-scope network segment. Which of the following is the best to use in this scenario?
Question 447

During a penetration testing engagement, a penetration tester discovers a buffer overflow vulnerability. Which of the following actions should the tester take to maintain professionalism and integrity?
Question 448

A penetration tester has compromised a customer's internal network, gaining access to a file server that hosts email server backups. Which of the following is the best tool to assist with data exfiltration?
Question 449

Given the following table:
Which of the following data structures would most likely be used to store known-good configurations of firewall rules in a Python script?
Question 450

Which of the following best explains why a penetration tester would use ProxyChains during an assessment?
Question