Exam Details

  • Exam Code
    :PT0-002
  • Exam Name
    :CompTIA PenTest+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :455 Q&As
  • Last Updated
    :Apr 05, 2025

CompTIA CompTIA Certifications PT0-002 Questions & Answers

  • Question 141:

    Penetration-testing activities have concluded, and the initial findings have been reviewed with the client. Which of the following best describes the NEXT step in the engagement?

    A. Acceptance by the client and sign-off on the final report

    B. Scheduling of follow-up actions and retesting

    C. Attestation of findings and delivery of the report

    D. Review of the lessons learned during the engagement

  • Question 142:

    A company that requires minimal disruption to its daily activities needs a penetration tester to perform information gathering around the company's web presence. Which of the following would the tester find MOST helpful in the initial information-gathering steps? (Choose two.)

    A. IP addresses and subdomains

    B. Zone transfers

    C. DNS forward and reverse lookups

    D. Internet search engines

    E. Externally facing open ports

    F. Shodan results

  • Question 143:

    A penetration tester would like to obtain FTP credentials by deploying a workstation as an on-path attack between the target and the server that has the FTP protocol. Which of the following methods would be the BEST to accomplish this objective?

    A. Wait for the next login and perform a downgrade attack on the server.

    B. Capture traffic using Wireshark.

    C. Perform a brute-force attack over the server.

    D. Use an FTP exploit against the server.

  • Question 144:

    During an internal penetration test against a company, a penetration tester was able to navigate to another part of the network and locate a folder containing customer information such as addresses, phone numbers, and credit card numbers. To be PCI compliant, which of the following should the company have implemented to BEST protect this data?

    A. Vulnerability scanning

    B. Network segmentation

    C. System hardening

    D. Intrusion detection

  • Question 145:

    Which of the following would assist a penetration tester the MOST when evaluating the susceptibility of top-level executives to social engineering attacks?

    A. Scraping social media for personal details

    B. Registering domain names that are similar to the target company's

    C. Identifying technical contacts at the company

    D. Crawling the company's website for company information

  • Question 146:

    Which of the following tools provides Python classes for interacting with network protocols?

    A. Responder

    B. Impacket

    C. Empire

    D. PowerSploit

  • Question 147:

    A penetration tester downloaded the following Perl script that can be used to identify vulnerabilities in network switches. However, the script is not working properly.

    Which of the following changes should the tester apply to make the script work as intended?

    A. Change line 2 to $ip= 10.192.168.254;

    B. Remove lines 3, 5, and 6.

    C. Remove line 6.

    D. Move all the lines below line 7 to the top of the script.

  • Question 148:

    Which of the following can be used to store alphanumeric data that can be fed into scripts or programs as input to penetration-testing tools?

    A. Dictionary

    B. Directory

    C. Symlink

    D. Catalog

    E. For-loop

  • Question 149:

    Which of the following types of information would MOST likely be included in an application security assessment report addressed to developers? (Choose two.)

    A. Use of non-optimized sort functions

    B. Poor input sanitization

    C. Null pointer dereferences

    D. Non-compliance with code style guide

    E. Use of deprecated Javadoc tags

    F. A cydomatic complexity score of 3

  • Question 150:

    A penetration tester exploited a vulnerability on a server and remotely ran a payload to gain a shell. However, a connection was not established, and no errors were shown on the payload execution. The penetration tester suspected that a network device, like an IPS or next-generation firewall, was dropping the connection. Which of the following payloads are MOST likely to establish a shell successfully?

    A. windows/x64/meterpreter/reverse_tcp

    B. windows/x64/meterpreter/reverse_http

    C. windows/x64/shell_reverse_tcp

    D. windows/x64/powershell_reverse_tcp

    E. windows/x64/meterpreter/reverse_https

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your PT0-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.