Exam Details

  • Exam Code
    :PT0-002
  • Exam Name
    :CompTIA PenTest+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :455 Q&As
  • Last Updated
    :Apr 13, 2025

CompTIA CompTIA Certifications PT0-002 Questions & Answers

  • Question 231:

    A penetration tester is able to capture the NTLM challenge-response traffic between a client and a server.

    Which of the following can be done with the pcap to gain access to the server?

    A. Perform vertical privilege escalation.

    B. Replay the captured traffic to the server to recreate the session.

    C. Use John the Ripper to crack the password.

    D. Utilize a pass-the-hash attack.

  • Question 232:

    A penetration tester has gained access to a network device that has a previously unknown IP range on an interface. Further research determines this is an always-on VPN tunnel to a third-party supplier.

    Which of the following is the BEST action for the penetration tester to take?

    A. Utilize the tunnel as a means of pivoting to other internal devices.

    B. Disregard the IP range, as it is out of scope.

    C. Stop the assessment and inform the emergency contact.

    D. Scan the IP range for additional systems to exploit.

  • Question 233:

    A penetration tester discovered a code repository and noticed passwords were hashed before they were stored in the database with the following code? salt = `123' hash = hashlib.pbkdf2_hmac(`sha256', plaintext, salt, 10000) The tester recommended the code be updated to the following salt = os.urandom(32) hash = hashlib.pbkdf2_hmac(`sha256', plaintext, salt, 10000).

    Which of the following steps should the penetration tester recommend?

    A. Changing passwords that were created before this code update

    B. Keeping hashes created by both methods for compatibility

    C. Rehashing all old passwords with the new code

    D. Replacing the SHA-256 algorithm to something more secure

  • Question 234:

    When developing a shell script intended for interpretation in Bash, the interpreter /bin/bash should be explicitly specified. Which of the following character combinations should be used on the first line of the script to accomplish this goal?

    A. <#

    B. <$

    C. ##

    D. #$

    E. #!

  • Question 235:

    Which of the following is the most important aspect to consider when calculating the price of a penetration test service for a client?

    A. Operating cost

    B. Required scope of work

    C. Non-disclosure agreement

    D. Client's budget

  • Question 236:

    During a penetration tester found a web component with no authentication requirements. The web component also allows file uploads and is hosted on one of the target public web the following actions should the penetration tester perform next?

    A. Continue the assessment and mark the finding as critical.

    B. Attempting to remediate the issue temporally.

    C. Notify the primary contact immediately.

    D. Shutting down the web server until the assessment is finished

  • Question 237:

    A penetration tester was conducting a penetration test and discovered the network traffic was no longer reaching the client's IP address. The tester later discovered the SOC had used sinkholing on the penetration tester's IP address. Which of the following BEST describes what happened?

    A. The penetration tester was testing the wrong assets

    B. The planning process failed to ensure all teams were notified

    C. The client was not ready for the assessment to start

    D. The penetration tester had incorrect contact information

  • Question 238:

    Which of the following describes the reason why a penetration tester would run the command sdelete mimikatz. * on a Windows server that the tester compromised?

    A. To remove hash-cracking registry entries

    B. To remove the tester-created Mimikatz account

    C. To remove tools from the server

    D. To remove a reverse shell from the system

  • Question 239:

    During a penetration-testing engagement, a consultant performs reconnaissance of a client to identify potential targets for a phishing campaign. Which of the following would allow the consultant to retrieve email addresses for technical and billing contacts quickly, without triggering any of the client's cybersecurity tools? (Choose two.)

    A. Scraping social media sites

    B. Using the WHOIS lookup tool

    C. Crawling the client's website

    D. Phishing company employees

    E. Utilizing DNS lookup tools

    F. Conducting wardriving near the client facility

  • Question 240:

    A penetration tester analyzed a web-application log file and discovered an input that was sent to the company's web application. The input contains a string that says "WAITFOR." Which of the following attacks is being attempted?

    A. SQL injection

    B. HTML injection

    C. Remote command injection

    D. DLL injection

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your PT0-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.