Free PT0-002 Exam Braindumps

Pass your CompTIA PenTest+ Certification Exam exam with these free Questions and Answers

Page 16 of 56
QUESTION 71

A penetration tester wants to scan a target network without being detected by the client’s IDS. Which of the following scans is MOST likely to avoid detection?

  1. A. nmap –p0 –T0 –sS 192.168.1.10
  2. B. nmap –sA –sV --host-timeout 60 192.168.1.10
  3. C. nmap –f --badsum 192.168.1.10
  4. D. nmap –A –n 192.168.1.10

Correct Answer: A

QUESTION 72

A penetration tester runs the following command on a system:
find / -user root –perm -4000 –print 2>/dev/null
Which of the following is the tester trying to accomplish?

  1. A. Set the SGID on all files in the / directory
  2. B. Find the /root directory on the system
  3. C. Find files with the SUID bit set
  4. D. Find files that were created during exploitation and move them to /dev/null

Correct Answer: C
the 2>/dev/null is output redirection, it simply sends all the error messages to infinity and beyond preventing any error messages to appear in the terminal session.

QUESTION 73

A private investigation firm is requesting a penetration test to determine the likelihood that attackers can gain access to mobile devices and then exfiltrate data from those devices. Which of the following is a
social-engineering method that, if successful, would MOST likely enable both objectives?

  1. A. Send an SMS with a spoofed service number including a link to download a malicious application.
  2. B. Exploit a vulnerability in the MDM and create a new account and device profile.
  3. C. Perform vishing on the IT help desk to gather a list of approved device IMEIs for masquerading.
  4. D. Infest a website that is often used by employees with malware targeted toward x86 architectures.

Correct Answer: A
Since it doesn't indicate company owned devices, sending a text to download an application is best. And it says social-engineering so a spoofed text falls under that area.

QUESTION 74

A penetration tester who is conducting a vulnerability assessment discovers that ICMP is disabled on a network segment. Which of the following could be used for a denial-of-service attack on the network segment?

  1. A. Smurf
  2. B. Ping flood
  3. C. Fraggle
  4. D. Ping of death

Correct Answer: C
Fraggle attack is same as a Smurf attack but rather than ICMP, UDP protocol is used. The prevention of these attacks is almost identical to Fraggle attack.
Ref: https://www.okta.com/identity-101/fraggle-attack/

QUESTION 75

Which of the following situations would MOST likely warrant revalidation of a previous security assessment?

  1. A. After detection of a breach
  2. B. After a merger or an acquisition
  3. C. When an organization updates its network firewall configurations
  4. D. When most of the vulnerabilities have been remediated

Correct Answer: D

Page 16 of 56

Post your Comments and Discuss CompTIA PT0-002 exam with other Community members: