Win IT Exam with Last Dumps 2024

CompTIA PT0-002 Exam

Page 7/9
Viewing Questions 61 70 out of 84 Questions

Question 61
Which of the following tools would be MOST useful in collecting vendor and other security-relevant information for IoT devices to support passive reconnaissance?

Question 62
Which of the following should a penetration tester consider FIRST when engaging in a penetration test in a cloud environment?

Question 63
HOTSPOT -You are a security analyst tasked with hardening a web server. You have been given a list of HTTP payloads that were flagged as malicious.
INSTRUCTION -Giving the following attack signatures, determine the attack type, and then identify the associated remediation to prevent the attack in the future.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Hot Area:
Image PT0-002_63Q.png related to the CompTIA PT0-002 Exam
Image PT0-002_63R.png related to the CompTIA PT0-002 Exam

Question 64
A penetration tester runs the unshadow command on a machine.
Which of the following tools will the tester most likely use NEXT?

Question 65
A penetration tester obtained the following results after scanning a web server using the dirb utility:
Which of the following elements is MOST likely to contain useful information for the penetration tester?
Image PT0-002_65Q.png related to the CompTIA PT0-002 Exam

Question 66
A company has hired a penetration tester to deploy and set up a rogue access point on the network.
Which of the following is the BEST tool to use to accomplish this goal?

Question 67
A penetration tester was able to gain access successfully to a Windows workstation on a mobile client's laptop.
Which of the following can be used to ensure the tester is able to maintain access to the system?

Question 68
A company hired a penetration-testing team to review the cyber-physical systems in a manufacturing plant. The team immediately discovered the supervisory systems and PLCs are both connected to the company intranet.
Which of the following assumptions, if made by the penetration-testing team, is MOST likely to be valid?

Question 69
A penetration tester downloaded a Java application file from a compromised web server and identifies how to invoke it by looking at the following log:
Which of the following is the order of steps the penetration tester needs to follow to validate whether the Java application uses encryption over sockets?
Image PT0-002_69Q.png related to the CompTIA PT0-002 Exam

Question 70
When planning a penetration-testing effort, clearly expressing the rules surrounding the optimal time of day for test execution is important because: