CompTIA PT0-002 CompTIA PenTest+ Certification Exam Practice Test

Page: 1 / 14
Total 464 questions
Question 1

A penetration tester discovers a file, key.enc. on a shared drive and then executes the following command, which yields the following output:

Which of the following are the best recommendations for the penetration tester to suggest? (Select two).



Answer : B, D


Question 2

A penetration tester is doing an assessment for a company that requires an external command-and-control server. The command-and-control tool should be able to use multiple types of payloads (PowerShell. SMB. and binaries) and centralize the management of compromised systems. Which of the following tools should the tester use?



Answer : B


Question 3

A penetration tester has compromised a customer's internal network, gaining access to a file server that hosts email server backups. Which of the following is the best tool to assist with data exfiltration?



Answer : D


Question 4

During a penetration testing engagement, a penetration tester discovers a buffer overflow vulnerability. Which of the following actions should the tester take to maintain professionalism and integrity?



Answer : C


Question 5

A penetration tester would like to know if any web servers or mail servers are running on the in-scope network segment. Which of the following is the best to use in this scenario?



Answer : D


Question 6

A client claims that a ransomware attack has crippled its corporate network following a penetration test assessment. Which of the following is the most likely root cause of this issue?



Answer : D


Question 7

Which of the following describes why scoping and organizational requirements are important when planning a penetration test?



Answer : B

Scoping defines the penetration test's boundaries and objectives, ensuring alignment with the client's needs and expectations. This is a key step in pre-engagement activities, as outlined in the CompTIA Pentest+ objectives.


Page:    1 / 14   
Total 464 questions