Free PT0-002 Exam Braindumps

Pass your CompTIA PenTest+ Certification Exam exam with these free Questions and Answers

Page 15 of 56
QUESTION 66

Penetration tester has discovered an unknown Linux 64-bit executable binary. Which of the following tools would be BEST to use to analyze this issue?

  1. A. Peach
  2. B. WinDbg
  3. C. GDB
  4. D. OllyDbg

Correct Answer: C
OLLYDBG, WinDBG, and IDA are all debugging tools that support Windows environments. GDB is a Linuxspecific debugging tool.

QUESTION 67

A company is concerned that its cloud service provider is not adequately protecting the VMs housing its software development. The VMs are housed in a datacenter with other companies sharing physical resources. Which of the following attack types is MOST concerning to the company?

  1. A. Data flooding
  2. B. Session riding
  3. C. Cybersquatting
  4. D. Side channel

Correct Answer: D
https://www.techtarget.com/searchsecurity/definition/side-channel-attack#:~:text=Side-channel attacks%

QUESTION 68

A company’s Chief Executive Officer has created a secondary home office and is concerned that the WiFi service being used is vulnerable to an attack. A penetration tester is hired to test the security of the WiFi’s router.
Which of the following is MOST vulnerable to a brute-force attack?

  1. A. WPS
  2. B. WPA2-EAP
  3. C. WPA-TKIP
  4. D. WPA2-PSK

Correct Answer: A

QUESTION 69

A penetration tester wants to identify CVEs that can be leveraged to gain execution on a Linux server that has an SSHD running. Which of the following would BEST support this task?

  1. A. Run nmap with the –o, -p22, and –sC options set against the target
  2. B. Run nmap with the –sV and –p22 options set against the target
  3. C. Run nmap with the --script vulners option set against the target
  4. D. Run nmap with the –sA option set against the target

Correct Answer: A

QUESTION 70

When planning a penetration-testing effort, clearly expressing the rules surrounding the optimal time of day for test execution is important because:

  1. A. security compliance regulations or laws may be violated.
  2. B. testing can make detecting actual APT more challenging.
  3. C. testing adds to the workload of defensive cyber- and threat-hunting teams.
  4. D. business and network operations may be impacted.

Correct Answer: D

Page 15 of 56

Post your Comments and Discuss CompTIA PT0-002 exam with other Community members: