Exam Details

  • Exam Code
    :PT0-002
  • Exam Name
    :CompTIA PenTest+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :455 Q&As
  • Last Updated
    :Mar 28, 2025

CompTIA CompTIA Certifications PT0-002 Questions & Answers

  • Question 391:

    A penetration tester was hired to test Wi-Fi equipment. Which of the following tools should be used to gather information about the wireless network?

    A. Kismet

    B. Burp Suite

    C. BeEF

    D. WHOIS

  • Question 392:

    A penetration tester is conducting an assessment for an e-commerce company and successfully copies the user database to the local machine. After a closer review, the penetration tester identifies several high- profile celebrities who have active user accounts with the online service. Which of the following is the most appropriate next step?

    A. Contact the high-profile celebrities.

    B. Delete the high-profile accounts.

    C. Immediately contact the client.

    D. Record the findings in the penetration test report.

  • Question 393:

    A penetration tester issues the following command after obtaining a low-privilege reverse shell: wmic service get name,pathname,startmode

    Which of the following is the most likely reason the penetration tester ran this command?

    A. To search for passwords in the service directory

    B. To list scheduled tasks that may be exploitable

    C. To register a service to run as System

    D. To find services that have unquoted service paths

  • Question 394:

    Which of the following tools can a penetration tester use to brute force a user password over SSH using multiple threads?

    A. CeWL

    B. John the Ripper

    C. Hashcat

    D. Hydra

  • Question 395:

    For an engagement, a penetration tester is required to use only local operating system tools for file transfer. Which of the following options should the penetration tester consider?

    A. Netcat

    B. WinSCP

    C. Filezilla

    D. Netstat

  • Question 396:

    A penetration tester is working to enumerate the PLC devices on the 10.88.88.76/24 network. Which of the following commands should the tester use to achieve the objective in a way that minimizes the risk of affecting the PLCs?

    A. nmap --script=s7-info -p 102 10.88.88.76/24 -T3

    B. nmap --script=wsdd-discover -p 3702 -sUlO.88.88.76/24

    C. nmap --script=iax2-version -p 4569 -sU -V 10.88.88.76/24 -T2

    D. nmap --script=xll-access -p 6000-6009 10.88.88.76/24

  • Question 397:

    A penetration testing firm performs an assessment every six months for the same customer. While performing network scanning for the latest assessment, the penetration tester observes that several of the target hosts appear to be residential connections associated with a major television and ISP in the area. Which of the following is the most likely reason for the observation?

    A. The penetration tester misconfigured the network scanner.

    B. The network scanning tooling is not functioning properly.

    C. The IP ranges changed ownership.

    D. The network scanning activity is being blocked by a firewall.

  • Question 398:

    A penetration tester is performing an assessment for an application that is used by large organizations operating in the heavily regulated financial services industry. The penetration tester observes that the default Admin User account is enabled and appears to be used several times a day by unfamiliar IP addresses. Which of the following is the most appropriate way to remediate this issue?

    A. Increase password complexity.

    B. Implement system hardening.

    C. Restrict simultaneous user log-ins.

    D. Require local network access.

  • Question 399:

    Which of the following would be the most efficient way to write a Python script that interacts with a web application?

    A. Create a class for requests.

    B. Write a function for requests.

    C. Import the requests library.

    D. Use the cURL OS command.

  • Question 400:

    Which of the following best explains why communication is a vital phase of a penetration test?

    A. To discuss situational awareness

    B. To build rapport with the emergency contact

    C. To explain the data destruction process

    D. To ensure the likelihood of future assessments

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your PT0-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.