Exam Details

  • Exam Code
    :PT0-002
  • Exam Name
    :CompTIA PenTest+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :455 Q&As
  • Last Updated
    :Mar 28, 2025

CompTIA CompTIA Certifications PT0-002 Questions & Answers

  • Question 81:

    A penetration-testing team is conducting a physical penetration test to gain entry to a building. Which of the following is the reason why the penetration testers should carry copies of the engagement documents with them?

    A. As backup in case the original documents are lost

    B. To guide them through the building entrances

    C. To validate the billing information with the client

    D. As proof in case they are discovered

  • Question 82:

    An assessor wants to run an Nmap scan as quietly as possible. Which of the following commands will give the LEAST chance of detection?

    A. nmap -"T3 192.168.0.1

    B. nmap - "P0 192.168.0.1

    C. nmap - T0 192.168.0.1

    D. nmap - A 192.168.0.1

  • Question 83:

    A penetration tester attempted a DNS poisoning attack. After the attempt, no traffic was seen from the target machine. Which of the following MOST likely caused the attack to fail?

    A. The injection was too slow.

    B. The DNS information was incorrect.

    C. The DNS cache was not refreshed.

    D. The client did not receive a trusted response.

  • Question 84:

    During the scoping phase of an assessment, a client requested that any remote code exploits discovered during testing would be reported immediately so the vulnerability could be fixed as soon as possible. The penetration tester did not agree with this request, and after testing began, the tester discovered a vulnerability and gained internal access to the system. Additionally, this scenario led to a loss of confidential credit card data and a hole in the system. At the end of the test, the penetration tester willfully failed to report this information and left the vulnerability in place. A few months later, the client was breached and credit card data was stolen. After being notified about the breach, which of the following steps should the company take NEXT?

    A. Deny that the vulnerability existed

    B. Investigate the penetration tester.

    C. Accept that the client was right.

    D. Fire the penetration tester.

  • Question 85:

    A penetration tester received a .pcap file to look for credentials to use in an engagement. Which of the following tools should the tester utilize to open and read the .pcap file?

    A. Nmap

    B. Wireshark

    C. Metasploit

    D. Netcat

  • Question 86:

    A penetration tester is reviewing the following SOW prior to engaging with a client:

    "Network diagrams, logical and physical asset inventory, and employees' names are to be treated as client confidential. Upon completion of the engagement, the penetration tester will submit findings to the client's Chief Information Security

    Officer (CISO) via encrypted protocols and subsequently dispose of all findings by erasing them in a secure manner."

    Based on the information in the SOW, which of the following behaviors would be considered unethical? (Choose two.)

    A. Utilizing proprietary penetration-testing tools that are not available to the public or to the client for auditing and inspection

    B. Utilizing public-key cryptography to ensure findings are delivered to the CISO upon completion of the engagement

    C. Failing to share with the client critical vulnerabilities that exist within the client architecture to appease the client's senior leadership team

    D. Seeking help with the engagement in underground hacker forums by sharing the client's public IP address

    E. Using a software-based erase tool to wipe the client's findings from the penetration tester's laptop

    F. Retaining the SOW within the penetration tester's company for future use so the sales team can plan future engagements

  • Question 87:

    A penetration tester is explaining the MITRE ATTandCK framework to a company's chief legal counsel. Which of the following would the tester MOST likely describe as a benefit of the framework?

    A. Understanding the tactics of a security intrusion can help disrupt them.

    B. Scripts that are part of the framework can be imported directly into SIEM tools.

    C. The methodology can be used to estimate the cost of an incident better.

    D. The framework is static and ensures stability of a security program overtime.

  • Question 88:

    A penetration tester has extracted password hashes from the lsass.exe memory process. Which of the following should the tester perform NEXT to pass the hash and provide persistence with the newly acquired credentials?

    A. Use Patator to pass the hash and Responder for persistence.

    B. Use Hashcat to pass the hash and Empire for persistence.

    C. Use a bind shell to pass the hash and WMI for persistence.

    D. Use Mimikatz to pass the hash and PsExec for persistence.

  • Question 89:

    A penetration tester executes the following Nmap command and obtains the following output:

    Which of the following commands would best help the penetration tester discover an exploitable service?

    A. nmap -v -p 25 -- soript smtp-enum-users remotehost

    B. nmap -v -- script=mysql-info.nse remotehost

    C. nmap --ocript=omb-brute.noe remotehoat

    D. nmap -p 3306 -- script "http*vuln*" remotehost

  • Question 90:

    A penetration tester is looking for vulnerabilities within a company's web application that are in scope. The penetration tester discovers a login page and enters the following string in a field:

    1;SELECT Username, Password FROM Users;

    Which of the following injection attacks is the penetration tester using?

    A. Blind SQL

    B. Boolean SQL

    C. Stacked queries

    D. Error-based

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your PT0-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.