Free PT0-002 Exam Braindumps

Pass your CompTIA PenTest+ Certification Exam exam with these free Questions and Answers

Page 7 of 56
QUESTION 26

Which of the following concepts defines the specific set of steps and approaches that are conducted during a penetration test?

  1. A. Scope details
  2. B. Findings
  3. C. Methodology
  4. D. Statement of work

Correct Answer: C

QUESTION 27

Which of the following would MOST likely be included in the final report of a static application-security test that was written with a team of application developers as the intended audience?

  1. A. Executive summary of the penetration-testing methods used
  2. B. Bill of materials including supplies, subcontracts, and costs incurred during assessment
  3. C. Quantitative impact assessments given a successful software compromise
  4. D. Code context for instances of unsafe type-casting operations

Correct Answer: D

QUESTION 28

A company provided the following network scope for a penetration test:
* 169.137.1.0/24
* 221.10.1.0/24
* 149.14.1.0/24
A penetration tester discovered a remote command injection on IP address 149.14.1.24 and exploited the system. Later, the tester learned that this particular IP address belongs to a third party. Which of the following stakeholders is responsible for this mistake?

  1. A. The company that requested the penetration test
  2. B. The penetration testing company
  3. C. The target host's owner
  4. D. The penetration tester
  5. E. The subcontractor supporting the test

Correct Answer: A

QUESTION 29

A penetration tester receives the following results from an Nmap scan:
PT0-002 dumps exhibit
Which of the following OSs is the target MOST likely running?

  1. A. CentOS
  2. B. Arch Linux
  3. C. Windows Server
  4. D. Ubuntu

Correct Answer: C

QUESTION 30

A consultant is reviewing the following output after reports of intermittent connectivity issues:
? (192.168.1.1) at 0a:d1:fa:b1:01:67 on en0 ifscope [ethernet]
? (192.168.1.12) at 34:a4:be:09:44:f4 on en0 ifscope [ethernet]
? (192.168.1.17) at 92:60:29:12:ac:d2 on en0 ifscope [ethernet]
? (192.168.1.34) at 88:de:a9:12:ce:fb on en0 ifscope [ethernet]
? (192.168.1.136) at 0a:d1:fa:b1:01:67 on en0 ifscope [ethernet]
? (192.168.1.255) at ff:ff:ff:ff:ff:ff on en0 ifscope [ethernet]
? (224.0.0.251) at 01:02:5e:7f:ff:fa on en0 ifscope permanent [ethernet]
? (239.255.255.250) at ff:ff:ff:ff:ff:ff on en0 ifscope permanent [ethernet] Which of the following is MOST likely to be reported by the consultant?

  1. A. A device on the network has an IP address in the wrong subnet.
  2. B. A multicast session was initiated using the wrong multicast group.
  3. C. An ARP flooding attack is using the broadcast address to perform DDoS.
  4. D. A device on the network has poisoned the ARP cache.

Correct Answer: D
The gateway for the network (192.168.1.1) is at 0a:d1:fa:b1:01:67, and then, another machine (192.168.1.136) also claims to be on the same MAC address. With this on the same network, intermittent connectivity will be inevitable as along as the gateway remains unreachable on the IP known by the others machines on the network, and given that the new machine claiming to be the gateway has not been configured to route traffic.

Page 7 of 56

Post your Comments and Discuss CompTIA PT0-002 exam with other Community members: