CompTIA PenTest+ PT0-002 – Question090

An Nmap network scan has found five open ports with identified services. Which of the following tools should a penetration tester use NEXT to determine if any vulnerabilities with associated exploits exist on the open ports?

A.
OpenVAS
B. Drozer
C. Burp Suite
D. OWASP ZAP

Correct Answer: A

CompTIA PenTest+ PT0-002 – Question089

A penetration tester writes the following script:

Which of the following is the tester performing?

A.
Searching for service vulnerabilities
B. Trying to recover a lost bind shell
C. Building a reverse shell listening on specified ports
D. Scanning a network for specific open ports

Correct Answer: D

CompTIA PenTest+ PT0-002 – Question088

A penetration tester who is conducting a vulnerability assessment discovers that ICMP is disabled on a network segment. Which of the following could be used for a denial-of-service attack on the network segment?

A.
Smurf
B. Ping flood
C. Fraggle
D. Ping of death

Correct Answer: A

CompTIA PenTest+ PT0-002 – Question087

Which of the following should a penetration tester do NEXT after identifying that an application being tested has already been compromised with malware?

A.
Analyze the malware to see what it does.
B. Collect the proper evidence and then remove the malware.
C. Do a root-cause analysis to find out how the malware got in.
D. Remove the malware immediately.
E. Stop the assessment and inform the emergency contact.

Correct Answer: D

CompTIA PenTest+ PT0-002 – Question086

A security professional wants to test an IoT device by sending an invalid packet to a proprietary service listening on TCP port 3011. Which of the following would allow the security professional to easily and programmatically manipulate the TCP header length and checksum using arbitrary numbers and to observe how the proprietary service responds?

A.
Nmap
B. tcpdump
C. Scapy
D. hping3

Correct Answer: A

CompTIA PenTest+ PT0-002 – Question084

A Chief Information Security Officer wants a penetration tester to evaluate whether a recently installed firewall is protecting a subnetwork on which many decades-old legacy systems are connected. The penetration tester decides to run an OS discovery and a full port scan to identify all the systems and any potential vulnerability.
Which of the following should the penetration tester consider BEFORE running a scan?

A.
The timing of the scan
B. The bandwidth limitations
C. The inventory of assets and versions
D. The type of scan

Correct Answer: C

CompTIA PenTest+ PT0-002 – Question082

A penetration tester discovers a web server that is within the scope of the engagement has already been compromised with a backdoor. Which of the following should the penetration tester do NEXT?

A.
Forensically acquire the backdoor Trojan and perform attribution.
B. Utilize the backdoor in support of the engagement.
C. Continue the engagement and include the backdoor finding in the final report.
D. Inform the customer immediately about the backdoor.

Correct Answer: D

CompTIA PenTest+ PT0-002 – Question081

Penetration-testing activities have concluded, and the initial findings have been reviewed with the client. Which of the following best describes the NEXT step in the engagement?

A.
Acceptance by the client and sign-off on the final report
B. Scheduling of follow-up actions and retesting
C. Attestation of findings and delivery of the report
D. Review of the lessons during the engagement

Correct Answer: A