Month End Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA PenTest+ PT0-002 Questions and answers with ValidTests

Exam PT0-002 All Questions
Exam PT0-002 Premium Access

View all detail and faqs for the PT0-002 exam

Viewing page 1 out of 14 pages
Viewing questions 1-10 out of questions
Questions # 1:

An external consulting firm is hired to perform a penetration test and must keep the confidentiality of the security vulnerabilities and the private data found in a customer's systems. Which of the following documents addresses this requirement?

Options:

A.

ROE

B.

NDA

C.

MOU

D.

SLA

Expert Solution
Questions # 2:

During a penetration testing engagement, a penetration tester discovers a buffer overflow vulnerability. Which of the following actions should the tester take to maintain professionalism and integrity?

Options:

A.

Apply for a bug bounty reward from the manufacturer.

B.

Inform the appropriate authorities about the vulnerability before informing the client.

C.

Report the vulnerability to the client and provide recommendations for remediation.

D.

Exploit the vulnerability to demonstrate its impact to the client.

Expert Solution
Questions # 3:

Which of the following best explains why a penetration tester would use ProxyChains during an assessment?

Options:

A.

To harvest credentials

B.

To use remote access tools

C.

To fingerprint the organization

D.

To automate protocols

Expert Solution
Questions # 4:

An organization's Chief Information Security Officer debates the validity of a critical finding from a penetration assessment that was completed six months ago. Which of the following post-report delivery activities would have most likely prevented this scenario?

Options:

A.

Client acceptance

B.

Data destruction process

C.

Attestation of findings

D.

Lessons learned

Expert Solution
Questions # 5:

A client claims that a ransomware attack has crippled its corporate network following a penetration test assessment. Which of the following is the most likely root cause of this issue?

Options:

A.

Client reluctance to accept findings

B.

Lack of attestation

C.

Incomplete data destruction process

D.

Failure to remove tester-created credentials

Expert Solution
Questions # 6:

A penetration tester runs a reconnaissance script and would like the output in a standardized machine-readable format in order to pass the data to another application. Which of the following is the best for the tester to use?

Options:

A.

JSON

B.

Lists

C.

XLS

D.

Trees

Expert Solution
Questions # 7:

A penetration tester discovered a vulnerability that has the following CVEs:

Question # 7

Which of the following CVEs should be remediated first?

Options:

A.

CVE-2007-6750

B.

CVE-2011-3192

C.

CVE-2012-2122

D.

CVE-2014-0160

E.

CVE-2017-7494

Expert Solution
Questions # 8:

Which of the following should be included in scope documentation?

Options:

A.

Service accounts

B.

Tester experience

C.

Disclaimer

D.

Number of tests

Expert Solution
Questions # 9:

During a security assessment of a web application, a penetration tester was able to generate the following application response:

Unclosed quotation mark after the character string Incorrect syntax near ".

Which of the following is the most probable finding?

Options:

A.

SQL injection

B.

Cross-site scripting

C.

Business logic flaw

D.

Race condition

Expert Solution
Questions # 10:

During an assessment, a penetration tester discovers the following code sample in a web application:

"(&(userid=*)(userid=*))(I(userid=*)(userPwd=(SHAl}a9993e364706816aba3e25717850c26c9cd0d89d==))

Which of the following injections is being performed?

Options:

A.

Boolean SQL

B.

Command

C.

Blind SQL

D.

LDAP

Expert Solution
Viewing page 1 out of 14 pages
Viewing questions 1-10 out of questions