CompTIA PenTest+ PT0-002 – Question100

A penetration tester is conducting an authorized, physical penetration test to attempt to enter a client's building during non-business hours. Which of the following are MOST important for the penetration tester to have during the test? (Choose two.)

A.
A handheld RF spectrum analyzer
B. A mask and personal protective equipment
C. Caution tape for marking off insecure areas
D. A dedicated point of contact at the client
E. The paperwork documenting the engagement
F. Knowledge of the building's normal business hours

Correct Answer: AE

CompTIA PenTest+ PT0-002 – Question099

A penetration tester ran a simple Python-based scanner. The following is a snippet of the code:

Which of the following BEST describes why this script triggered a "probable port scan" alert in the organization's IDS?

A.
sock.settimeout(20) on line 7 caused each next socket to be created every 20 milliseconds.
B. *range(1, 1025) on line 1 populated the portList list in numerical order.
C. Line 6 uses socket.SOCK_STREAM instead of socket.SOCK_DGRAM
D. The remoteSvr variable has neither been type-hinted nor initialized.

Correct Answer: A

CompTIA PenTest+ PT0-002 – Question098

During an engagement, a penetration tester found the following list of strings inside a file:

Which of the following is the BEST technique to determine the known plaintext of the strings?

A.
Dictionary attack
B. Rainbow table attack
C. Brute-force attack
D. Credential-stuffing attack

CompTIA PenTest+ PT0-002 – Question097

Which of the following situations would require a penetration tester to notify the emergency contact for the engagement?

A.
The team exploits a critical server within the organization.
B. The team exfiltrates PII or credit card data from the organization.
C. The team loses access to the network remotely.
D. The team discovers another actor on a system on the network.

Correct Answer: D

CompTIA PenTest+ PT0-002 – Question096

A final penetration test report has been submitted to the board for review and accepted. The report has three findings rated high. Which of the following should be the NEXT step?

A.
Perform a new penetration test.
B. Remediate the findings.
C. Provide the list of common vulnerabilities and exposures.
D. Broaden the scope of the penetration test.

Correct Answer: B

CompTIA PenTest+ PT0-002 – Question095

A penetration tester wrote the following script to be used in one engagement:

Which of the following actions will this script perform?

A.
Look for open ports.
B. Listen for a reverse shell.
C. Attempt to flood open ports.
D. Create an encrypted tunnel.

Correct Answer: A

CompTIA PenTest+ PT0-002 – Question094

An assessor wants to run an Nmap scan as quietly as possible. Which of the following commands will give the
LEAST chance of detection?

A.
nmap T3 192.168.0.1
B. nmap P0 192.168.0.1
C. nmap T0 192.168.0.1
D. nmap A 192.168.0.1

Correct Answer: B

CompTIA PenTest+ PT0-002 – Question092

A penetration tester utilized Nmap to scan host 64.13.134.52 and received the following results:

Based on the output, which of the following services are MOST likely to be exploited? (Choose two.)

A.
Telnet
B. HTTP
C. SMTP
D. DNS
E. NTP
F. SNMP

Correct Answer: BD

CompTIA PenTest+ PT0-002 – Question091

A CentOS computer was exploited during a penetration test. During initial reconnaissance, the penetration tester discovered that port 25 was open on an internal Sendmail server. To remain stealthy, the tester ran the following command from the attack machine:

Which of the following would be the BEST command to use for further progress into the targeted network?

A.
nc 10.10.1.2
B. ssh 10.10.1.2
C. nc 127.0.0.1 5555
D. ssh 127.0.0.1 5555

Correct Answer: A