Special Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

PT0-002 Exam Dumps - CompTIA PenTest+ Questions and Answers

Question # 34

A penetration tester is performing a vulnerability scan on a large ATM network. One of the organization's requirements is that the scan does not affect legitimate clients' usage of the ATMs. Which of the following should the tester do to best meet the company's vulnerability scan requirements?

Options:

A.

Use Nmap's -T2 switch to run a slower scan and with less resources.

B.

Run the scans using multiple machines.

C.

Run the scans only during lunch hours.

D.

Use Nmap's -host-timeout switch to skip unresponsive targets.

Buy Now
Question # 35

Options:

A.

To identify potential risks and threats during testing

B.

To define the boundaries and objectives

C.

To ensure that all vulnerabilities are identified and addressed

D.

To validate the project timeline and resource allocations

Buy Now
Question # 36

Which of the following tools can a penetration tester use to brute force a user password over SSH using multiple threads?

Options:

A.

CeWL

B.

John the Ripper

C.

Hashcat

D.

Hydra

Buy Now
Question # 37

A penetration tester discovers a file, key.enc. on a shared drive and then executes the following command, which yields the following output:

Which of the following are the best recommendations for the penetration tester to suggest? (Select two).

Options:

A.

Implementing password management

B.

Switching to using DSA keys

C.

Using stronger encryption for private key files

D.

Deleting unencrypted files from the share

E.

Disabling the openssl command

F.

Initiating key rotation

Buy Now
Question # 38

After successfully compromising a remote host, a security consultant notices an endpoint protection software is running on the host. Which of the following commands would be

best for the consultant to use to terminate the protection software and its child processes?

Options:

A.

taskkill /PID /T /F

B.

taskkill /PID /IM /F

C.

taskkill /PID /S /U

D.

taskkill /PID /F /P

Buy Now
Question # 39

Which of the following would be the most efficient way to write a Python script that interacts with a web application?

Options:

A.

Create a class for requests.

B.

Write a function for requests.

C.

Import the requests library.

D.

Use the cURL OS command.

Buy Now
Question # 40

Which of the following is the most important to include in the scope of a wireless security assessment?

Options:

A.

Frequencies

B.

APs

C.

SSIDs

D.

Signal strengths

Buy Now
Question # 41

During an assessment, a penetration tester was able Jo get access on all target servers by attempting authentication using a service account key that was published on the intranet site as part of a standard procedure. Which of the following should the penetration tester recommend for this type of finding?

Options:

A.

Password encryption

B.

Role-based access control

C.

Secrets management solution

D.

Time-of-day restrictions

Buy Now
Question # 42

A penetration tester noticed that an employee was using a wireless headset with a smartphone. Which of the following methods would be best to use to intercept the communications?

Options:

A.

Multiplexing

B.

Bluejacking

C.

Zero-day attack

D.

Smurf attack

Buy Now
Question # 43

Which of the following OSSTM testing methodologies should be used to test under the worst conditions?

Options:

A.

Tandem

B.

Reversal

C.

Semi-authorized

D.

Known environment

Buy Now
Exam Code: PT0-002
Exam Name: CompTIA PenTest+ Certification Exam
Last Update: Mar 31, 2025
Questions: 464
PT0-002 pdf

PT0-002 PDF

$25.5  $84.99
PT0-002 Engine

PT0-002 Testing Engine

$28.5  $94.99
PT0-002 PDF + Engine

PT0-002 PDF + Testing Engine

$40.5  $134.99