New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

PT0-002 Exam Dumps - CompTIA PenTest+ Certification Exam

Go to page:
Question # 97

Which of the following tools provides Python classes for interacting with network protocols?

A.

Responder

B.

Impacket

C.

Empire

D.

PowerSploit

Full Access
Question # 98

Appending string values onto another string is called:

A.

compilation

B.

connection

C.

concatenation

D.

conjunction

Full Access
Question # 99

During an assessment, a penetration tester gathered OSINT for one of the IT systems administrators from the target company and managed to obtain valuable information, including corporate email addresses. Which of the following techniques should the penetration tester perform NEXT?

A.

Badge cloning

B.

Watering-hole attack

C.

Impersonation

D.

Spear phishing

Full Access
Question # 100

A company has hired a penetration tester to deploy and set up a rogue access point on the network.

Which of the following is the BEST tool to use to accomplish this goal?

A.

Wireshark

B.

Aircrack-ng

C.

Kismet

D.

Wifite

Full Access
Question # 101

A penetration tester was conducting a penetration test and discovered the network traffic was no longer reaching the client’s IP address. The tester later discovered the SOC had used sinkholing on the penetration tester’s IP address. Which of the following BEST describes what happened?

A.

The penetration tester was testing the wrong assets

B.

The planning process failed to ensure all teams were notified

C.

The client was not ready for the assessment to start

D.

The penetration tester had incorrect contact information

Full Access
Question # 102

A penetration tester who is doing a company-requested assessment would like to send traffic to another system using double tagging. Which of the following techniques would BEST accomplish this goal?

A.

RFID cloning

B.

RFID tagging

C.

Meta tagging

D.

Tag nesting

Full Access
Question # 103

A penetration tester performs the following command:

curl –I –http2 https://www.comptia.org

Which of the following snippets of output will the tester MOST likely receive?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 104
A.

Burp Suite

B.

Wireshark

C.

Metasploit

D.

Nmap

Full Access
Go to page: