Exam Details

  • Exam Code
    :PT0-002
  • Exam Name
    :CompTIA PenTest+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :455 Q&As
  • Last Updated
    :Mar 28, 2025

CompTIA CompTIA Certifications PT0-002 Questions & Answers

  • Question 341:

    For a penetration test engagement, a security engineer decides to impersonate the IT help desk. The security engineer sends a phishing email containing an urgent request for users to change their passwords and a link to https:// example.com/index.html. The engineer has designed the attack so that once the users enter the credentials, the index.html page takes the credentials and then forwards them to another server that the security engineer is controlling. Given the following information:

    Which of the following lines of code should the security engineer add to make the attack successful?

    A. window.location.= 'https://evilcorp.com'

    B. crossDomain: true

    C. geturlparameter ('username')

    D. redirectUrl = 'https://example.com'

  • Question 342:

    After gaining access to a Linux system with a non-privileged account, a penetration tester identifies the following file:

    Which of the following actions should the tester perform FIRST?

    A. Change the file permissions.

    B. Use privilege escalation.

    C. Cover tracks.

    D. Start a reverse shell.

  • Question 343:

    A penetration tester is attempting to get more people from a target company to download and run an executable. Which of the following would be the.. :tive way for the tester to achieve this objective?

    A. Dropping USB flash drives around the company campus with the file on it

    B. Attaching the file in a phishing SMS that warns users to execute the file or they will be locked out of their accounts

    C. Sending a pretext email from the IT department before sending the download instructions later

    D. Saving the file in a common folder with a name that encourages people to click it

  • Question 344:

    A large client wants a penetration tester to scan for devices within its network that are Internet facing. The client is specifically looking for Cisco devices with no authentication requirements. Which of the following settings in Shodan would meet the client's requirements?

    A. "cisco-ios" "admin+1234"

    B. "cisco-ios" "no-password"

    C. "cisco-ios" "default-passwords"

    D. "cisco-ios" "last-modified"

  • Question 345:

    During enumeration, a red team discovered that an external web server was frequented by employees. After compromising the server, which of the following attacks would best support ------------company systems?

    A. Aside-channel attack

    B. A command injection attack

    C. A watering-hole attack

    D. A cross-site scripting attack

  • Question 346:

    A security firm is discussing the results of a penetration test with a client. Based on the findings, the client wants to focus the remaining time on a critical network segment. Which of the following best describes the action taking place?

    A. Maximizing the likelihood of finding vulnerabilities

    B. Reprioritizing the goals/objectives

    C. Eliminating the potential for false positives

    D. Reducing the risk to the client environment

  • Question 347:

    A company obtained permission for a vulnerability scan from its cloud service provider and now wants to test the security of its hosted data.

    Which of the following should the tester verify FIRST to assess this risk?

    A. Whether sensitive client data is publicly accessible

    B. Whether the connection between the cloud and the client is secure

    C. Whether the client's employees are trained properly to use the platform

    D. Whether the cloud applications were developed using a secure SDLC

  • Question 348:

    A penetration tester was brute forcing an internal web server and ran a command that produced the following output:

    However, when the penetration tester tried to browse the URL http://172.16.100.10:3000/profile, a blank page was displayed. Which of the following is the MOST likely reason for the lack of output?

    A. The HTTP port is not open on the firewall.

    B. The tester did not run sudo before the command.

    C. The web server is using HTTPS instead of HTTP.

    D. This URI returned a server error.

  • Question 349:

    A penetration tester is using the following script: Which of the following BEST describes the purpose of this script?

    A. To determine if a web server's date/time function is susceptible to attack

    B. To determine if a web server's time zone has been misconfigured

    C. To determine the difference between local and server time

    D. To determine and display the round-trip time of HTTP requests

  • Question 350:

    Which of the following is the activity that is typically required the MOST during the post-engagement cleanup phase?

    A. Removing shells

    B. Launching new attacks

    C. Documenting vulnerabilities

    D. Requesting payment

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your PT0-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.