Online PT0-002 Practice TestMore CompTIA Products >

Free CompTIA PT0-002 Exam Dumps Questions

CompTIA PT0-002: CompTIA PenTest+ Certification Exam

- Get instant access to PT0-002 practice exam questions

- Get ready to pass the CompTIA PenTest+ Certification Exam exam right now using our CompTIA PT0-002 exam package, which includes CompTIA PT0-002 practice test plus an CompTIA PT0-002 Exam Simulator.

- The best online PT0-002 exam study material and preparation tool is here.

4.5 
(1755 ratings)

Question 1

A penetration tester runs the following command on a system:
find / -user root –perm -4000 –print 2>/dev/null
Which of the following is the tester trying to accomplish?

Correct Answer:C

Question 2

A penetration tester has been given eight business hours to gain access to a client’s financial system. Which of the following techniques will have the highest likelihood of success?

Correct Answer:C

Question 3

A penetration tester is looking for a vulnerability that enables attackers to open doors via a specialized TCP service that is used for a physical access control system. The service exists on more than 100 different hosts, so the tester would like to automate the assessment. Identification requires the penetration tester to:
PT0-002 dumps exhibit Have a full TCP connection
PT0-002 dumps exhibit Send a “hello” payload
PT0-002 dumps exhibit Walt for a response
PT0-002 dumps exhibit Send a string of characters longer than 16 bytes
Which of the following approaches would BEST support the objective?

Correct Answer:C

Question 4

A company hired a penetration tester to do a social-engineering test against its employees. Although the tester did not find any employees’ phone numbers on the company’s website, the tester has learned the complete phone catalog was published there a few months ago.
In which of the following places should the penetration tester look FIRST for the employees’ numbers?

Correct Answer:A

Question 5

An assessment has been completed, and all reports and evidence have been turned over to the client. Which of the following should be done NEXT to ensure the confidentiality of the client’s information?

Correct Answer:D

Question 6

A company’s Chief Executive Officer has created a secondary home office and is concerned that the WiFi service being used is vulnerable to an attack. A penetration tester is hired to test the security of the WiFi’s router.
Which of the following is MOST vulnerable to a brute-force attack?

Correct Answer:A

START PT0-002 EXAM