Win IT Exam with Last Dumps 2024

CompTIA PT0-002 Exam

Page 2/9
Viewing Questions 11 20 out of 84 Questions

Question 11
SIMULATION -You are a penetration tester reviewing a client's website through a web browser.
INSTRUCTIONS -Review all components of the website through the browser to determine if vulnerabilities are present.
Remediate ONLY the highest vulnerability from either the certificate, source, or cookies.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Image PT0-002_11Q.png related to the CompTIA PT0-002 Exam
Image PT0-002_11R.png related to the CompTIA PT0-002 Exam

Question 12
A Chief Information Security Officer wants a penetration tester to evaluate the security awareness level of the company's employees.
Which of the following tools can help the tester achieve this goal?

Question 13
Which of the following is the MOST common vulnerability associated with IoT devices that are directly connected to the Internet?

Question 14
Which of the following describes the reason why a penetration tester would run the command sdelete mimikatz. * on a Windows server that the tester compromised?

Question 15
A penetration tester is scanning a corporate lab network for potentially vulnerable services.
Which of the following Nmap commands will return vulnerable ports that might be interesting to a potential attacker?

Question 16
A penetration tester was brute forcing an internal web server and ran a command that produced the following output:
However, when the penetration tester tried to browse the URL, a blank page was displayed.
Which of the following is the MOST likely reason for the lack of output?
Image PT0-002_16Q.png related to the CompTIA PT0-002 Exam

Question 17
A penetration tester was conducting a penetration test and discovered the network traffic was no longer reaching the client's IP address. The tester later discovered the SOC had used sinkholing on the penetration tester's IP address.
Which of the following MOST likely describes what happened?

Question 18
An Nmap scan shows open ports on web servers and databases. A penetration tester decides to run WPScan and SQLmap to identify vulnerabilities and additional information about those systems.
Which of the following is the penetration tester trying to accomplish?

Question 19
A company hired a penetration tester to do a social-engineering test against its employees. Although the tester did not find any employees' phone numbers on the company's website, the tester has learned the complete phone catalog was published there a few months ago.
In which of the following places should the penetration tester look FIRST for the employees' numbers?

Question 20
A penetration tester wants to identify CVEs that can be leveraged to gain execution on a Linux server that has an SSHD running.
Which of the following would BEST support this task?