Exam Details

  • Exam Code
    :PT0-002
  • Exam Name
    :CompTIA PenTest+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :455 Q&As
  • Last Updated
    :Apr 13, 2025

CompTIA CompTIA Certifications PT0-002 Questions & Answers

  • Question 161:

    Which of the following tools would BEST allow a penetration tester to capture wireless handshakes to reveal a Wi-Fi password from a Windows machine?

    A. Wireshark

    B. EAPHammer

    C. Kismet

    D. Aircrack-ng

  • Question 162:

    A penetration tester captured the following traffic during a web-application test:

    Which of the following methods should the tester use to visualize the authorization information being transmitted?

    A. Decode the authorization header using UTF-8.

    B. Decrypt the authorization header using bcrypt.

    C. Decode the authorization header using Base64.

    D. Decrypt the authorization header using AES.

  • Question 163:

    A penetration tester is conducting an authorized, physical penetration test to attempt to enter a client's building during non-business hours. Which of the following are MOST important for the penetration tester to have during the test? (Choose two.)

    A. A handheld RF spectrum analyzer

    B. A mask and personal protective equipment

    C. Caution tape for marking off insecure areas

    D. A dedicated point of contact at the client

    E. The paperwork documenting the engagement

    F. Knowledge of the building's normal business hours

  • Question 164:

    A penetration tester who is conducting a web-application test discovers a clickjacking vulnerability associated with a login page to financial data. Which of the following should the tester do with this information to make this a successful exploit?

    A. Perform XSS.

    B. Conduct a watering-hole attack.

    C. Use BeEF.

    D. Use browser autopwn.

  • Question 165:

    When preparing for an engagement with an enterprise organization, which of the following is one of the MOST important items to develop fully prior to beginning the penetration testing activities?

    A. Clarify the statement of work.

    B. Obtain an asset inventory from the client.

    C. Interview all stakeholders.

    D. Identify all third parties involved.

  • Question 166:

    During an engagement, a penetration tester found the following list of strings inside a file: Which of the following is the BEST technique to determine the known plaintext of the strings?

    A. Dictionary attack

    B. Rainbow table attack

    C. Brute-force attack

    D. Credential-stuffing attack

  • Question 167:

    A company hired a penetration-testing team to review the cyber-physical systems in a manufacturing plant. The team immediately discovered the supervisory systems and PLCs are both connected to the company intranet. Which of the following assumptions, if made by the penetration-testing team, is MOST likely to be valid?

    A. PLCs will not act upon commands injected over the network.

    B. Supervisors and controllers are on a separate virtual network by default.

    C. Controllers will not validate the origin of commands.

    D. Supervisory systems will detect a malicious injection of code/commands.

  • Question 168:

    Penetration tester is developing exploits to attack multiple versions of a common software package. The versions have different menus and )ut.. they have a common log-in screen that the exploit must use. The penetration tester develops code to perform the log-in that can be each of the exploits targeted to a specific version. Which of the following terms is used to describe this common log-in code example?

    A. Conditional

    B. Library

    C. Dictionary

    D. Sub application

  • Question 169:

    A penetration tester successfully performed an exploit on a host and was able to hop from VLAN 100 to VLAN 200. VLAN 200 contains servers that perform financial transactions, and the penetration tester now wants the local interface of the attacker machine to have a static ARP entry in the local cache. The attacker machine has the following:

    IP Address: 192.168.1.63

    Physical Address: 60-36-dd-a6-c5-33

    Which of the following commands would the penetration tester MOST likely use in order to establish a static ARP entry successfully?

    A. tcpdump -i eth01 arp and arp[6:2] == 2

    B. arp -s 192.168.1.63 60-36-DD-A6-C5-33

    C. ipconfig /all findstr /v 00-00-00 | findstr Physical

    D. route add 192.168.1.63 mask 255.255.255.255.0 192.168.1.1

  • Question 170:

    A penetration tester is testing a new version of a mobile application in a sandbox environment. To intercept and decrypt the traffic between the application and the external API, the tester has created a private root CA and issued a certificate from it. Even though the tester installed the root CA into the trusted stone of the smartphone used for the tests, the application shows an error indicating a certificate mismatch and does not connect to the server. Which of the following is the MOST likely reason for the error?

    A. TCP port 443 is not open on the firewall

    B. The API server is using SSL instead of TLS

    C. The tester is using an outdated version of the application

    D. The application has the API certificate pinned.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your PT0-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.