Exam Details

  • Exam Code
    :PT0-002
  • Exam Name
    :CompTIA PenTest+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :455 Q&As
  • Last Updated
    :Apr 13, 2025

CompTIA CompTIA Certifications PT0-002 Questions & Answers

  • Question 191:

    A penetration tester breaks into a company's office building and discovers the company does not have a shredding service. Which of the following attacks should the penetration tester try next?

    A. Dumpster diving

    B. Phishing

    C. Shoulder surfing

    D. Tailgating

  • Question 192:

    PCI DSS requires which of the following as part of the penetration-testing process?

    A. The penetration tester must have cybersecurity certifications.

    B. The network must be segmented.

    C. Only externally facing systems should be tested.

    D. The assessment must be performed during non-working hours.

  • Question 193:

    A penetration tester wants to identify CVEs that can be leveraged to gain execution on a Linux server that has an SSHD running. Which of the following would BEST support this task?

    A. Run nmap with the –o, -p22, and –sC options set against the target

    B. Run nmap with the –sV and –p22 options set against the target

    C. Run nmap with the --script vulners option set against the target

    D. Run nmap with the –sA option set against the target

  • Question 194:

    Which of the following provides a matrix of common tactics and techniques used by attackers along with recommended mitigations?

    A. NIST SP 800-53

    B. OWASP Top 10

    C. MITRE ATTandCK framework

    D. PTES technical guidelines

  • Question 195:

    In an unprotected network file repository, a penetration tester discovers a text file containing usernames and passwords in cleartext and a spreadsheet containing data for 50 employees, including full names, roles, and serial numbers. The tester realizes some of the passwords in the text file follow the format: . Which of the following would be the best action for the tester to take NEXT with this information?

    A. Create a custom password dictionary as preparation for password spray testing.

    B. Recommend using a password manage/vault instead of text files to store passwords securely.

    C. Recommend configuring password complexity rules in all the systems and applications.

    D. Document the unprotected file repository as a finding in the penetration-testing report.

  • Question 196:

    Penetration on an assessment for a client organization, a penetration tester notices numerous outdated software package versions were installed ...s-critical servers. Which of the following would best mitigate this issue?

    A. Implementation of patching and change control programs

    B. Revision of client scripts used to perform system updates

    C. Remedial training for the client's systems administrators

    D. Refrainment from patching systems until quality assurance approves

  • Question 197:

    When accessing the URL http://192.168.0-1/validate/user.php, a penetration tester obtained the following output:

    ..d index: eid in /apache/www/validate/user.php line 12

    ..d index: uid in /apache/www/validate/user.php line 13

    ..d index: pw in /apache/www/validate/user.php line 14

    ..d index: acl in /apache/www/validate/user.php line 15

    A. Lack of code signing

    B. Incorrect command syntax

    C. Insufficient error handling

    D. Insecure data transmission

  • Question 198:

    Which of the following assessment methods is MOST likely to cause harm to an ICS environment?

    A. Active scanning

    B. Ping sweep

    C. Protocol reversing

    D. Packet analysis

  • Question 199:

    A client has requested that the penetration test scan include the following UDP services:

    SNMP, NetBIOS, and DNS.

    Which of the following Nmap commands will perform the scan?

    A. nmap –vv sUV –p 53, 123-159 10.10.1.20/24 –oA udpscan

    B. nmap –vv sUV –p 53,123,161-162 10.10.1.20/24 –oA udpscan

    C. nmap –vv sUV –p 53,137-139,161-162 10.10.1.20/24 –oA udpscan

    D. nmap –vv sUV –p 53, 122-123, 160-161 10.10.1.20/24 –oA udpscan

  • Question 200:

    A penetration tester has been hired to examine a website for flaws. During one of the time windows for testing, a network engineer notices a flood of GET requests to the web server, reducing the website's response time by 80%. The network engineer contacts the penetration tester to determine if these GET requests are part of the test. Which of the following BEST describes the purpose of checking with the penetration tester?

    A. Situational awareness

    B. Rescheduling

    C. DDoS defense

    D. Deconfliction

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your PT0-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.