Exam Details

  • Exam Code
    :PT0-002
  • Exam Name
    :CompTIA PenTest+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :455 Q&As
  • Last Updated
    :Apr 13, 2025

CompTIA CompTIA Certifications PT0-002 Questions & Answers

  • Question 151:

    Which of the following is most important to include in the final report of a static application- security test that was written with a team of application developers as the intended audience?

    A. Executive summary of the penetration-testing methods used

    B. Bill of materials including supplies, subcontracts, and costs incurred during assessment

    C. Quantitative impact assessments given a successful software compromise

    D. Code context for instances of unsafe typecasting operations

  • Question 152:

    A penetration tester completed a vulnerability scan against a web server and identified a single but severe vulnerability.

    Which of the following is the BEST way to ensure this is a true positive?

    A. Run another scanner to compare.

    B. Perform a manual test on the server.

    C. Check the results on the scanner.

    D. Look for the vulnerability online.

  • Question 153:

    Running a vulnerability scanner on a hybrid network segment that includes general IT servers and industrial control systems:

    A. will reveal vulnerabilities in the Modbus protocol.

    B. may cause unintended failures in control systems.

    C. may reduce the true positive rate of findings.

    D. will create a denial-of-service condition on the IP networks.

  • Question 154:

    Which of the following documents is agreed upon by all parties associated with the penetration-testing engagement and defines the scope, contacts, costs, duration, and deliverables?

    A. SOW

    B. SLA

    C. MSA

    D. NDA

  • Question 155:

    A penetration tester is assessing a wireless network. Although monitoring the correct channel and SSID, the tester is unable to capture a handshake between the clients and the AP. Which of the following attacks is the MOST effective to allow the penetration tester to capture a handshake?

    A. Key reinstallation

    B. Deauthentication

    C. Evil twin

    D. Replay

  • Question 156:

    Within a Python script, a line that states print (var) outputs the following:

    [{'1' : 'CentOS', '2' : 'Ubuntu'), {'1' : 'Windows 10', '2' : 'Windows Server 2016'}]

    Which of the following objects or data structures is var ?

    A. An array

    B. A class

    C. A dictionary

    D. A list

  • Question 157:

    A penetration tester is scanning a corporate lab network for potentially vulnerable services. Which of the following Nmap commands will return vulnerable ports that might be interesting to a potential attacker?

    A. nmap192.168.1.1-5–PU22-25,80

    B. nmap192.168.1.1-5–PA22-25,80

    C. nmap192.168.1.1-5–PS22-25,80

    D. nmap192.168.1.1-5–Ss22-25,80

  • Question 158:

    A penetration tester received a 16-bit network block that was scoped for an assessment. During the assessment, the tester realized no hosts were active in the provided block of IPs and reported this to the company. The company then provided an updated block of IPs to the tester. Which of the following would be the most appropriate NEXT step?

    A. Terminate the contract.

    B. Update the ROE with new signatures. Most Voted

    C. Scan the 8-bit block to map additional missed hosts.

    D. Continue the assessment.

  • Question 159:

    A compliance-based penetration test is primarily concerned with:

    A. obtaining Pll from the protected network.

    B. bypassing protection on edge devices.

    C. determining the efficacy of a specific set of security standards.

    D. obtaining specific information from the protected network.

  • Question 160:

    A penetration tester is evaluating a company's network perimeter. The tester has received limited information about defensive controls or countermeasures, and limited internal knowledge of the testing exists. Which of the following should be the FIRST step to plan the reconnaissance activities?

    A. Launch an external scan of netblocks.

    B. Check WHOIS and netblock records for the company.

    C. Use DNS lookups and dig to determine the external hosts.

    D. Conduct a ping sweep of the company's netblocks.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your PT0-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.