Exam Details

  • Exam Code
    :PT0-002
  • Exam Name
    :CompTIA PenTest+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :455 Q&As
  • Last Updated
    :Mar 28, 2025

CompTIA CompTIA Certifications PT0-002 Questions & Answers

  • Question 331:

    A red-team tester has been contracted to emulate the threat posed by a malicious insider on a company's network, with the constrained objective of gaining access to sensitive personnel files. During the assessment, the red-team tester identifies an artifact indicating possible prior compromise within the target environment.

    Which of the following actions should the tester take?

    A. Perform forensic analysis to isolate the means of compromise and determine attribution.

    B. Incorporate the newly identified method of compromise into the red team's approach.

    C. Create a detailed document of findings before continuing with the assessment.

    D. Halt the assessment and follow the reporting procedures as outlined in the contract.

  • Question 332:

    A penetration tester has found indicators that a privileged user's password might be the same on 30 different Linux systems. Which of the following tools can help the tester identify the number of systems on which the password can be used?

    A. Hydra

    B. John the Ripper

    C. Cain and Abel

    D. Medusa

  • Question 333:

    Given the following script:

    Which of the following BEST characterizes the function performed by lines 5 and 6?

    A. Retrieves the start-of-authority information for the zone on DNS server 10.10.10.10

    B. Performs a single DNS query for www.comptia.org and prints the raw data output

    C. Loops through variable b to count the results returned for the DNS query and prints that count to screen

    D. Prints each DNS query result already stored in variable b

  • Question 334:

    A penetration tester discovered that a client uses cloud mail as the company's email system. During the penetration test, the tester set up a fake cloud mail login page and sent all company employees an email that stated their inboxes were full and directed them to the fake login page to remedy the issue. Which of the following BEST describes this attack?

    A. Credential harvesting

    B. Privilege escalation

    C. Password spraying

    D. Domain record abuse

  • Question 335:

    A penetration tester runs the following command:

    nmap -p- -A 10.0.1.10

    Given the execution of this command, which of the following quantities of ports will Nmap scan?

    A. 1,000

    B. 1,024

    C. 10,000

    D. 65,535

  • Question 336:

    A new security firm is onboarding its first client. The client only allowed testing over the weekend and needed the results Monday morning. However, the assessment team was not able to access the environment as expected until Monday. Which of the following should the security company have acquired BEFORE the start of the assessment?

    A. A signed statement of work

    B. The correct user accounts and associated passwords

    C. The expected time frame of the assessment

    D. The proper emergency contacts for the client

  • Question 337:

    A penetration tester obtained the following results after scanning a web server using the dirb utility:

    ...

    GENERATED WORDS: 4612

    ---- Scanning URL: http://10.2.10.13/ ---

    +

    http://10.2.10.13/about (CODE:200|SIZE:1520)

    +

    http://10.2.10.13/home.html (CODE:200|SIZE:214)

    +

    http://10.2.10.13/index.html (CODE:200|SIZE:214)

    +

    http://10.2.10.13/info (CODE:200|SIZE:214)

    ...

    DOWNLOADED: 4612 ?FOUND: 4

    Which of the following elements is MOST likely to contain useful information for the penetration tester?

    A. index.html

    B. about

    C. info

    D. home.html

  • Question 338:

    A penetration tester wrote the following comment in the final report: "Eighty-five percent of the systems tested were found to be prone to unauthorized access from the internet." Which of the following audiences was this message intended?

    A. Systems administrators

    B. C-suite executives

    C. Data privacy ombudsman

    D. Regulatory officials

  • Question 339:

    Company.com has hired a penetration tester to conduct a phishing test. The tester wants to set up a fake log-in page and harvest credentials when target employees click on links in a phishing email. Which of the following commands would best help the tester determine which cloud email provider the log-in page needs to mimic?

    A. dig company.com MX

    B. whois company.com

    C. cur1 www.company.com

    D. dig company.com A

  • Question 340:

    A security professional wants to test an IoT device by sending an invalid packet to a proprietary service listening on TCP port 3011. Which of the following would allow the security professional to easily and programmatically manipulate the TCP header length and checksum using arbitrary numbers and to observe how the proprietary service responds?

    A. Nmap

    B. tcpdump

    C. Scapy

    D. hping3

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your PT0-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.