Welcome to KillTest.com

TOP Exams

Want to practice some free CompTIA PT0-002 exam questions? You can study the following CompTIA PT0-002 exam online questions. Killtest provides 380 Q&As for CompTIA PT0-002 exam, which has been proven effective in the PT0-002 exam preparation. Besides, you can get full payment fee refund if you fail PT0-002 exam by using Killtest PT0-002 practice exam questions. Ready? Go!

 Get PT0-002 with 380 Q&As

CompTIA PT0-002 Online Practice Exam Questions

The questions of PT0-002 were last updated on Apr 23,2024 .

Viewing page 1 out of 4 pages.

Viewing questions 1 out of 20 questions

Question#1

A penetration tester conducted a discovery scan that generated the following:

文本

描述已自动生成

Which of the following commands generated the results above and will transform them into a list of active hosts for further analysis?

A. nmap CoG list.txt 192.168.0.1-254 , sort
B. nmap Csn 192.168.0.1-254 , grep “Nmap scan” | awk ‘{print S5}’
C. nmap C-open 192.168.0.1-254, uniq
D. nmap Co 192.168.0.1-254, cut Cf 2

Question#2

A penetration tester has identified several newly released CVEs on a VoIP call manager. The scanning tool the tester used determined the possible presence of the CVEs based off the version number of the service.
Which of the following methods would BEST support validation of the possible findings?

A. Manually check the version number of the VoIP service against the CVE release
B. Test with proof-of-concept code from an exploit database
C. Review SIP traffic from an on-path position to look for indicators of compromise
D. Utilize an nmap CsV scan against the service

Explanation:
Reference: https://dokumen.pub/hacking-exposed-unified-communications-amp-voip-security-secrets-amp- solutions-2nd-edition-9780071798778-0071798773-9780071798761-0071798765.html

Question#3

A penetration tester recently performed a social-engineering attack in which the tester found an employee of the target company at a local coffee shop and over time built a relationship with the employee. On the employee’s birthday, the tester gave the employee an external hard drive as a gift.
Which of the following social-engineering attacks was the tester utilizing?

A. Phishing
B. Tailgating
C. Baiting
D. Shoulder surfing

Question#4

A company recruited a penetration tester to configure wireless IDS over the network.
Which of the following tools would BEST test the effectiveness of the wireless IDS solutions?

A. Aircrack-ng
B. Wireshark
C. Wifite
D. Kismet

Explanation:
Reference: https://purplesec.us/perform-wireless-penetration-test/

Question#5

A company that requires minimal disruption to its daily activities needs a penetration tester to perform information gathering around the company’s web presence.
Which of the following would the tester find MOST helpful in the initial information-gathering steps? (Choose two.)

A. IP addresses and subdomains
B. Zone transfers
C. DNS forward and reverse lookups
D. Internet search engines
E. Externally facing open ports
F. Shodan results

Exam Code: PT0-002
Q & A: 380 Q&As
Updated:  Apr 23,2024

 Get PT0-002 Full Version

KILLTEST CONTACT INFO

[email protected]

GMT+8: Mon-Sat 8:00-18:00

GMT: Mon-Sat 0:00-10:00