CompTIA PT0-002

Page:    1 / 140   
Total 696 questions | Updated On: Apr 23, 2024
Question 1

A penetration tester is conducting a penetration test. The tester obtains a root-level shell on a Linux server and
discovers the following data in a file named password.txt in the /home/svsacct directory:
U3VQZXIkM2NyZXQhCg==
Which of the following commands should the tester use NEXT to decode the contents of the file?


Answer: A
Question 2

Which of the following documents must be signed between the penetration tester and the client to govern how
any provided information is managed before, during, and after the engagement?


Answer: B
Question 3

In the statement of work (SOW) document, the scope of work defines which of the following?


Answer: D
Question 4

A client evaluating a penetration testing company requests examples of its work. Which of the following represents the BEST course of action for the penetration testers?


Answer: C
Question 5

A software company has hired a security consultant to assess the security of the company’s software
development practices. The consultant opts to begin reconnaissance by performing fuzzing on a software
binary. Which of the following vulnerabilities is the security consultant MOST likely to identify?


Answer: C
Page:    1 / 140   
Total 696 questions | Updated On: Apr 23, 2024

Quickly grab our PT0-002 product now and kickstart your exam preparation today!

Name: CompTIA PenTest+
Exam Code: PT0-002
Certification: CompTIA PenTest
Vendor: CompTIA
Total Questions: 696
Last Updated: Apr 23, 2024