Free PT0-002 Exam Braindumps

Pass your CompTIA PenTest+ Certification Exam exam with these free Questions and Answers

Page 10 of 56
QUESTION 41

When preparing for an engagement with an enterprise organization, which of the following is one of the MOST important items to develop fully prior to beginning the penetration testing activities?

  1. A. Clarify the statement of work.
  2. B. Obtain an asset inventory from the client.
  3. C. Interview all stakeholders.
  4. D. Identify all third parties involved.

Correct Answer: A

QUESTION 42

Which of the following tools would BEST allow a penetration tester to capture wireless handshakes to reveal a Wi-Fi password from a Windows machine?

  1. A. Wireshark
  2. B. EAPHammer
  3. C. Kismet
  4. D. Aircrack-ng

Correct Answer: D
The BEST tool to capture wireless handshakes to reveal a Wi-Fi password from a Windows machine is Aircrack-ng. Aircrack-ng is a suite of tools used to assess the security of wireless networks. It starts by capturing wireless network packets [1], then attempts to crack the network password by analyzing them [1]. Aircrack-ng supports FMS, PTW, and other attack types, and can also be used to generate keystreams for
WEP and WPA-PSK encryption. It is capable of running on Windows, Linux, and Mac OS X.
The BEST tool to capture wireless handshakes to reveal a Wi-Fi password from a Windows machine is Aircrack-ng. Aircrack-ng is a suite of tools used to assess the security of wireless networks. It starts by capturing wireless network packets [1], then attempts to crack the network password by analyzing them [1].
Aircrack-ng supports FMS, PTW, and other attack types, and can also be used to generate keystreams for WEP and WPA-PSK encryption. It is capable of running on Windows, Linux, and Mac OS X.

QUESTION 43

168.2.2
3: #!/usr/bin/python export $PORTS = 21,22 for $PORT in $PORTS: try:
Solution:


Does this meet the goal?

  1. A. Yes
  2. B. No

Correct Answer: A

QUESTION 44

The results of an Nmap scan are as follows:
PT0-002 dumps exhibit
Which of the following would be the BEST conclusion about this device?

  1. A. This device may be vulnerable to the Heartbleed bug due to the way transactions over TCP/22 handle heartbeat extension packets, allowing attackers to obtain sensitive information from process memory.
  2. B. This device is most likely a gateway with in-band management services.
  3. C. This device is most likely a proxy server forwarding requests over TCP/443.
  4. D. This device may be vulnerable to remote code execution because of a butter overflow vulnerability in the method used to extract DNS names from packets prior to DNSSEC validation.

Correct Answer: B
The heart bleed bug is an open ssl bug which does not affect SSH Ref:
https://www.sos-berlin.com/en/news-heartbleed-bug-does-not-affect-jobscheduler-or-ssh

QUESTION 45

Which of the following tools provides Python classes for interacting with network protocols?

  1. A. Responder
  2. B. Impacket
  3. C. Empire
  4. D. PowerSploit

Correct Answer: B

Page 10 of 56

Post your Comments and Discuss CompTIA PT0-002 exam with other Community members: