CompTIA PT0-002 Exam Practice Questions (P. 2)
- Full Access (531 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
SIMULATION -
You are a penetration tester reviewing a client's website through a web browser.
INSTRUCTIONS -
Review all components of the website through the browser to determine if vulnerabilities are present.
Remediate ONLY the highest vulnerability from either the certificate, source, or cookies.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.







You are a penetration tester reviewing a client's website through a web browser.
INSTRUCTIONS -
Review all components of the website through the browser to determine if vulnerabilities are present.
Remediate ONLY the highest vulnerability from either the certificate, source, or cookies.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.







Correct Answer:
See explanation below.
Step 1: Generate Certificate Signing Request
Step 2: Submit CSR to the CA -
Step 3: Remove certificate from the server
Step 4: Install re-issued certificate on the server
See explanation below.
Step 1: Generate Certificate Signing Request
Step 2: Submit CSR to the CA -
Step 3: Remove certificate from the server
Step 4: Install re-issued certificate on the server
send
light_mode
delete
Question #12
A Chief Information Security Officer wants a penetration tester to evaluate the security awareness level of the company's employees.
Which of the following tools can help the tester achieve this goal?
Which of the following tools can help the tester achieve this goal?
- AMetasploit
- BHydra
- CSETMost Voted
- DWPScan
Correct Answer:
C
C

SET, or Social Engineering Toolkit, is the most appropriate choice for assessing the security awareness of employees. It facilitates the simulation of various real-world social engineering attacks, providing a practical evaluation of how employees respond to potential security threats. This allows the penetration tester to effectively measure and enhance an organization's overall security awareness.
send
light_mode
delete
Question #13
Which of the following is the MOST common vulnerability associated with IoT devices that are directly connected to the Internet?
- AUnsupported operating systems
- BSusceptibility to DDoS attacks
- CInability to network
- DThe existence of default passwordsMost Voted
Correct Answer:
A
A

The predominant vulnerability in IoT devices directly connected to the internet is indeed the existence of default passwords. These standard default credentials are widely known and can easily be exploited, making them a significant vulnerability. Unsupported operating systems, while certainly a risk, do not pose as immediate a threat as default passwords, which are a direct pathway for attackers to gain unauthorized access. Always ensure to prioritize addressing devices with default passwords during security assessments.
send
light_mode
delete
Question #14
Which of the following describes the reason why a penetration tester would run the command sdelete mimikatz. * on a Windows server that the tester compromised?
- ATo remove hash-cracking registry entries
- BTo remove the tester-created Mimikatz account
- CTo remove tools from the serverMost Voted
- DTo remove a reverse shell from the system
Correct Answer:
B
B

The correct rationale behind a penetration tester using the command `sdelete mimikatz.*` on a compromised Windows server is to securely remove all traces of the Mimikatz tool, which is often used to extract sensitive credentials. By doing so, the tester ensures that these powerful tools do not fall into the wrong hands post-assessment, maintaining operational security and preventing potential misuse. Thus, option C "To remove tools from the server" better encapsulates the intention of this action, rather than option B.
send
light_mode
delete
Question #15
A penetration tester is scanning a corporate lab network for potentially vulnerable services.
Which of the following Nmap commands will return vulnerable ports that might be interesting to a potential attacker?
Which of the following Nmap commands will return vulnerable ports that might be interesting to a potential attacker?
- Anmap 192.168.1.1-5 -PU22-25,80
- Bnmap 192.168.1.1-5 -PA22-25,80
- Cnmap 192.168.1.1-5 -PS22-25,80Most Voted
- Dnmap 192.168.1.1-5 -Ss22-25,80
Correct Answer:
C
C

The correct option, C, uses the -PS flag which initiates a TCP SYN scan specifically targeting ports 22, 25, and 80. This approach is efficient for identifying active TCP services and can highlight ports with potential vulnerabilities, making them interesting for attackers. The use of -PS offers a good balance of speed and stealth, which is ideal during the reconnaissance phase of penetration testing. This method directly stimulates the kind of traffic used by potential attackers exploring for open TCP ports.
send
light_mode
delete
Question #16
A penetration tester was brute forcing an internal web server and ran a command that produced the following output:

However, when the penetration tester tried to browse the URL http://172.16.100.10:3000/profile, a blank page was displayed.
Which of the following is the MOST likely reason for the lack of output?

However, when the penetration tester tried to browse the URL http://172.16.100.10:3000/profile, a blank page was displayed.
Which of the following is the MOST likely reason for the lack of output?
- AThe HTTP port is not open on the firewall.
- BThe tester did not run sudo before the command.
- CThe web server is using HTTPS instead of HTTP.
- DThis URI returned a server error.Most Voted
Correct Answer:
A
A
send
light_mode
delete
Question #17
A penetration tester was conducting a penetration test and discovered the network traffic was no longer reaching the client's IP address. The tester later discovered the SOC had used sinkholing on the penetration tester's IP address.
Which of the following MOST likely describes what happened?
Which of the following MOST likely describes what happened?
- AThe penetration tester was testing the wrong assets.
- BThe planning process failed to ensure all teams were notified.Most Voted
- CThe client was not ready for the assessment to start.
- DThe penetration tester had incorrect contact information.
Correct Answer:
B
B

In the scenario described, the key issue clearly revolves around communication or the lack thereof. The SOC's decision to sinkhole the penetration tester's IP address highlights a lapse in notifying and coordinating with all relevant teams about the authorized penetration test. Effective communication and proper planning are fundamental to ensure that all defensive measures like sinkholing are appropriately calibrated during such assessments, avoiding unnecessary blocks and allowing the test to proceed smoothly.
send
light_mode
delete
Question #18
An Nmap scan shows open ports on web servers and databases. A penetration tester decides to run WPScan and SQLmap to identify vulnerabilities and additional information about those systems.
Which of the following is the penetration tester trying to accomplish?
Which of the following is the penetration tester trying to accomplish?
- AUncover potential criminal activity based on the evidence gathered.
- BIdentify all the vulnerabilities in the environment.
- CLimit invasiveness based on scope.Most Voted
- DMaintain confidentiality of the findings.
Correct Answer:
C
C

The penetration tester's decision to employ WPScan and SQLmap is primarily driven by a strategy to minimize the invasiveness of the testing. These tools are specialized; WPScan is used specifically for identifying vulnerabilities in WordPress sites, and SQLmap targets SQL injection vulnerabilities. This approach shows a focus on targeted, rather than comprehensive, vulnerability assessment, which aligns with the scope defined for the penetration testing engagement. Thus, the tester is acting to maintain a focused and less invasive testing strategy as per the predefined scope.
send
light_mode
delete
Question #19
A company hired a penetration tester to do a social-engineering test against its employees. Although the tester did not find any employees' phone numbers on the company's website, the tester has learned the complete phone catalog was published there a few months ago.
In which of the following places should the penetration tester look FIRST for the employees' numbers?
In which of the following places should the penetration tester look FIRST for the employees' numbers?
- AWeb archiveMost Voted
- BGitHub
- CFile metadata
- DUnderground forums
Correct Answer:
A
A

The correct choice is indeed the Web archive. Websites like the Wayback Machine retain historical snapshots of websites as they appeared at various dates. Given that the phone catalog was on the company's website a few months ago, the first and most logical step for a penetration tester seeking this information would be checking these archives. This approach is likely to yield quick and detailed results about previous publications on the site, including the phone catalog. Other options like GitHub and underground forums wouldn't provide such specific past data about the website.
send
light_mode
delete
Question #20
A penetration tester wants to identify CVEs that can be leveraged to gain execution on a Linux server that has an SSHD running.
Which of the following would BEST support this task?
Which of the following would BEST support this task?
- ARun nmap with the -O, -p22, and -sC options set against the target.
- BRun nmap with the -sV and -p22 options set against the target.
- CRun nmap with the --script vulners option set against the target.Most Voted
- DRun nmap with the -sA option set against the target.
Correct Answer:
D
D

Using the nmap tool with the --script vulners option is indeed the most effective method for identifying CVEs that can be exploited to gain execution on a Linux server with SSHD running. This script taps into Vulners, a comprehensive database that offers automated checks for numerous CVEs from various sources. It provides a targeted approach to finding precise security flaws on the host machine, exactly catering to the needs highlighted in the penetration testing scenario you are dealing with. This method directly aligns with the goal of finding actionable vulnerabilities rather than just obtaining service or operating system details.
send
light_mode
delete
All Pages