Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CompTIA PT0-002 Practice Exam with Questions & Answers | Set: 13

Questions 121

A penetration tester is required to perform a vulnerability scan that reduces the likelihood of false positives and increases the true positives of the results. Which of the following would MOST likely accomplish this goal?

Options:
A.

Using OpenVAS in default mode

B.

Using Nessus with credentials

C.

Using Nmap as the root user

D.

Using OWASP ZAP

CompTIA PT0-002 Premium Access
Questions 122

A penetration tester ran a simple Python-based scanner. The following is a snippet of the code:

PT0-002 Question 122

Which of the following BEST describes why this script triggered a `probable port scan` alert in the organization's IDS?

Options:
A.

sock.settimeout(20) on line 7 caused each next socket to be created every 20 milliseconds.

B.

*range(1, 1025) on line 1 populated the portList list in numerical order.

C.

Line 6 uses socket.SOCK_STREAM instead of socket.SOCK_DGRAM

D.

The remoteSvr variable has neither been type-hinted nor initialized.

Questions 123

A penetration tester analyzed a web-application log file and discovered an input that was sent to the company's web application. The input contains a string that says "WAITFOR." Which of the following attacks is being attempted?

Options:
A.

SQL injection

B.

HTML injection

C.

Remote command injection

D.

DLL injection

Questions 124

A penetration tester is testing a new API for the company's existing services and is preparing the following script:

PT0-002 Question 124

Which of the following would the test discover?

Options:
A.

Default web configurations

B.

Open web ports on a host

C.

Supported HTTP methods

D.

Listening web servers in a domain

Questions 125

In Python socket programming, SOCK_DGRAM type is:

Options:
A.

reliable.

B.

matrixed.

C.

connectionless.

D.

slower.

Questions 126

A penetration tester finds a PHP script used by a web application in an unprotected internal source code repository. After reviewing the code, the tester identifies the following:

PT0-002 Question 126

Which of the following combinations of tools would the penetration tester use to exploit this script?

Options:
A.

Hydra and crunch

B.

Netcat and cURL

C.

Burp Suite and DIRB

D.

Nmap and OWASP ZAP

Questions 127

A company requires that all hypervisors have the latest available patches installed. Which of the following would BEST explain the reason why this policy is in place?

Options:
A.

To provide protection against host OS vulnerabilities

B.

To reduce the probability of a VM escape attack

C.

To fix any misconfigurations of the hypervisor

D.

To enable all features of the hypervisor

Questions 128

The following output is from reconnaissance on a public-facing banking website:

PT0-002 Question 128

Based on these results, which of the following attacks is MOST likely to succeed?

Options:
A.

A birthday attack on 64-bit ciphers (Sweet32)

B.

An attack that breaks RC4 encryption

C.

An attack on a session ticket extension (Ticketbleed)

D.

A Heartbleed attack

Questions 129

Penetration tester who was exclusively authorized to conduct a physical assessment noticed there were no cameras pointed at the dumpster for company. The penetration tester returned at night and collected garbage that contained receipts for recently purchased networking :. The models of equipment purchased are vulnerable to attack. Which of the following is the most likely next step for the penetration?

Options:
A.

Alert the target company of the discovered information.

B.

Verify the discovered information is correct with the manufacturer.

C.

Scan the equipment and verify the findings.

D.

Return to the dumpster for more information.

Questions 130

A penetration tester gains access to a system and is able to migrate to a user process:

PT0-002 Question 130

Given the output above, which of the following actions is the penetration tester performing? (Choose two.)

Options:
A.

Redirecting output from a file to a remote system

B.

Building a scheduled task for execution

C.

Mapping a share to a remote system

D.

Executing a file on the remote system

E.

Creating a new process on all domain systems

F.

Setting up a reverse shell from a remote system

G.

Adding an additional IP address on the compromised system