CompTIA PT0-002 Exam Practice Questions (P. 3)
- Full Access (531 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #21
A penetration tester completed a vulnerability scan against a web server and identified a single but severe vulnerability.
Which of the following is the BEST way to ensure this is a true positive?
Which of the following is the BEST way to ensure this is a true positive?
- ARun another scanner to compare.
- BPerform a manual test on the server.Most Voted
- CCheck the results on the scanner.
- DLook for the vulnerability online.
Correct Answer:
B
B

To effectively confirm a true positive finding from a vulnerability scan, a manual testing approach is essential. Engaging directly with the suspected vulnerability allows a penetration tester to thoroughly explore and understand its mechanics and impacts. This hands-on methodology isn’t just about confirming the presence of the vulnerability; it also provides insight into its exploitability, helping to validate the findings beyond automated tools which might only offer an initial indication. Thus, manual testing isn’t just a verification step—it’s a deeper dive to ensure comprehensive security assessment.
send
light_mode
delete
Question #22
A penetration tester has been given eight business hours to gain access to a client's financial system.
Which of the following techniques will have the HIGHEST likelihood of success?
Which of the following techniques will have the HIGHEST likelihood of success?
- AAttempting to tailgate an employee who is going into the client's workplace
- BDropping a malicious USB key with the company's logo in the parking lot
- CUsing a brute-force attack against the external perimeter to gain a foothold
- DPerforming spear phishing against employees by posing as senior managementMost Voted
Correct Answer:
C
C

Let's consider the scenario detailed in the question: the timeframe is crucial here. Effective penetration testing must consider both efficiency and stealth. Brute-forcing, contrary to what might be initially thought, can be surprisingly quick for weaker passwords and potentially optimized with advanced tools like GPU acceleration. However, the pointed out comment rightly emphasizes the practical risks and limitations involved in brute forcing within an eight-hour window, especially against robust external defenses. It's suggested that spear phishing, as a more strategic approach leveraging the human factor, could likely offer a higher probability of success. This contrasts with brute-force attempts, which could too easily trigger security protocols or prove futile against more complex passwords within the given timeframe. Therefore, balancing against the possible infeasibility of a brute-force attack comfortably within eight hours, one should also consider the likely effectiveness of spear phishing under these constraints.
send
light_mode
delete
Question #23
A company's Chief Executive Officer has created a secondary home office and is concerned that the WiFi service being used is vulnerable to an attack. A penetration tester is hired to test the security of the WiFi's router.
Which of the following is MOST vulnerable to a brute-force attack?
Which of the following is MOST vulnerable to a brute-force attack?
- AWPSMost Voted
- BWPA2-EAP
- CWPA-TKIP
- DWPA2-PSK
Correct Answer:
B
Reference:
https://us-cert.cisa.gov/ncas/alerts/TA12-006A
B
Reference:
https://us-cert.cisa.gov/ncas/alerts/TA12-006A

send
light_mode
delete
Question #24
A penetration tester writes the following script:

Which of the following objectives is the tester attempting to achieve?

Which of the following objectives is the tester attempting to achieve?
- ADetermine active hosts on the network.Most Voted
- BSet the TTL of ping packets for stealth.
- CFill the ARP table of the networked devices.
- DScan the system on the most used ports.
Correct Answer:
A
A
send
light_mode
delete
Question #25
A penetration tester ran the following commands on a Windows server:

Which of the following should the tester do AFTER delivering the final report?

Which of the following should the tester do AFTER delivering the final report?
- ADelete the scheduled batch job.
- BClose the reverse shell connection.
- CDowngrade the svsaccount permissions.
- DRemove the tester-created credentials.Most Voted
Correct Answer:
C
C
send
light_mode
delete
Question #26
A penetration tester has established an on-path attack position and must now specially craft a DNS query response to be sent back to a target host.
Which of the following utilities would BEST support this objective?
Which of the following utilities would BEST support this objective?
- ASocat
- Btcpdump
- CScapyMost Voted
- Ddig
Correct Answer:
A
A

Scapy is indeed the more suitable tool for the task described in the question. It excels in creating and manipulating network packets, including crafting specific DNS responses necessary for conducting on-path attacks. This powerful packet manipulation utility enables precise control over packet contents, making it ideal for scenarios where a penetration tester needs to craft and send custom DNS query responses back to a target host, effectively facilitating network-based attacks and tests.
send
light_mode
delete
Question #27
A penetration tester is starting an assessment but only has publicly available information about the target company. The client is aware of this exercise and is preparing for the test.
Which of the following describes the scope of the assessment?
Which of the following describes the scope of the assessment?
- APartially known environment testing
- BKnown environment testing
- CUnknown environment testingMost Voted
- DPhysical environment testing
Correct Answer:
C
C
send
light_mode
delete
Question #28
The following line-numbered Python code snippet is being used in reconnaissance:

Which of the following line numbers from the script MOST likely contributed to the script triggering a `probable port scan` alert in the organization's IDS?

Which of the following line numbers from the script MOST likely contributed to the script triggering a `probable port scan` alert in the organization's IDS?
send
light_mode
delete
Question #29
A consulting company is completing the ROE during scoping.
Which of the following should be included in the ROE?
Which of the following should be included in the ROE?
- ACost of the assessment
- BReport distribution
- CTesting restrictionsMost Voted
- DLiability
Correct Answer:
B
B
send
light_mode
delete
Question #30
A new client hired a penetration-testing company for a month-long contract for various security assessments against the client's new service. The client is expecting to make the new service publicly available shortly after the assessment is complete and is planning to fix any findings, except for critical issues, after the service is made public. The client wants a simple report structure and does not want to receive daily findings.
Which of the following is most important for the penetration tester to define FIRST?
Which of the following is most important for the penetration tester to define FIRST?
- AEstablish the format required by the client.
- BEstablish the threshold of risk to escalate to the client immediately.Most Voted
- CEstablish the method of potential false positives.
- DEstablish the preferred day of the week for reporting.
Correct Answer:
A
A
send
light_mode
delete
All Pages