Exam Details

  • Exam Code
    :PT0-002
  • Exam Name
    :CompTIA PenTest+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :455 Q&As
  • Last Updated
    :Apr 13, 2025

CompTIA CompTIA Certifications PT0-002 Questions & Answers

  • Question 261:

    The following output is from reconnaissance on a public-facing banking website:

    Based on these results, which of the following attacks is MOST likely to succeed?

    A. A birthday attack on 64-bit ciphers (Sweet32)

    B. An attack that breaks RC4 encryption

    C. An attack on a session ticket extension (Ticketbleed)

    D. A Heartbleed attack

  • Question 262:

    During an assessment, a penetration tester inspected a log and found a series of thousands of requests coming from a single IP address to the same URL. A few of the requests are listed below.

    Which of the following vulnerabilities was the attacker trying to exploit?

    A. ..Session hijacking

    B. ..URL manipulation

    C. ..SQL injection

    D. ..Insecure direct object reference

  • Question 263:

    A penetration tester, who is doing an assessment, discovers an administrator has been exfiltrating proprietary company information. The administrator offers to pay the tester to keep quiet. Which of the following is the BEST action for the tester to take?

    A. Check the scoping document to determine if exfiltration is within scope.

    B. Stop the penetration test.

    C. Escalate the issue.

    D. Include the discovery and interaction in the daily report.

  • Question 264:

    A penetration tester is working on a scoping document with a new client. The methodology the client uses includes the following:

    Pre-engagement interaction (scoping and ROE) Intelligence gathering (reconnaissance) Threat modeling Vulnerability analysis Exploitation and post exploitation Reporting

    Which of the following methodologies does the client use?

    A. OWASP Web Security Testing Guide

    B. PTES technical guidelines

    C. NIST SP 800-115

    D. OSSTMM

  • Question 265:

    A penetration tester is testing a new API for the company's existing services and is preparing the following script:

    Which of the following would the test discover?

    A. Default web configurations

    B. Open web ports on a host

    C. Supported HTTP methods

    D. Listening web servers in a domain

  • Question 266:

    A penetration-testing team needs to test the security of electronic records in a company's office. Per the terms of engagement, the penetration test is to be conducted after hours and should not include circumventing the alarm or performing destructive entry. During outside reconnaissance, the team sees an open door from an adjoining building. Which of the following would be allowed under the terms of the engagement?

    A. Prying the lock open on the records room

    B. Climbing in an open window of the adjoining building

    C. Presenting a false employee ID to the night guard

    D. Obstructing the motion sensors in the hallway of the records room

  • Question 267:

    Appending string values onto another string is called:

    A. compilation

    B. connection

    C. concatenation

    D. conjunction

  • Question 268:

    Which of the following is the MOST important information to have on a penetration testing report that is written for the developers?

    A. Executive summary

    B. Remediation

    C. Methodology

    D. Metrics and measures

  • Question 269:

    Which of the following BEST describes why a client would hold a lessons-learned meeting with the penetration-testing team?

    A. To provide feedback on the report structure and recommend improvements

    B. To discuss the findings and dispute any false positives

    C. To determine any processes that failed to meet expectations during the assessment

    D. To ensure the penetration-testing team destroys all company data that was gathered during the test

  • Question 270:

    A penetration tester gains access to a system and is able to migrate to a user process:

    Given the output above, which of the following actions is the penetration tester performing? (Choose two.)

    A. Redirecting output from a file to a remote system

    B. Building a scheduled task for execution

    C. Mapping a share to a remote system

    D. Executing a file on the remote system

    E. Creating a new process on all domain systems

    F. Setting up a reverse shell from a remote system

    G. Adding an additional IP address on the compromised system

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your PT0-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.