IT認証試験問題集
毎月、GOWUKAKUは1500人以上の受験者が試験準備を助けて、試験に合格するために受験者にご協力します
 ホームページ / PT0-002 問題集  / PT0-002 問題練習

CompTIA PT0-002 問題練習

CompTIA PenTest+ Certification Exam 試験

最新更新時間: 2024/03/19,合計110問。

【2024年3月キャンペーン】:PT0-002 最新真題を買う時、日本語版と英語版両方を同時に獲得できます。

実際の問題集を練習し、試験のポイントを了解し、テストに申し込むするかどうかを決めることができます。

さらに試験準備時間の35%を節約するには、PT0-002 問題集を使用してください。

 / 4

Question No : 1
A penetration tester is testing a web application that is hosted by a public cloud provider. The tester is able to query the provider’s metadata and get the credentials used by the instance to authenticate itself .
Which of the following vulnerabilities has the tester exploited?

正解:
Explanation:
Reference: https://owasp.org/www-community/attacks/Server_Side_Request_Forgery

Question No : 2
A penetration tester was conducting a penetration test and discovered the network traffic was no longer reaching the client’s IP address. The tester later discovered the SOC had used sinkholing on the penetration tester’s IP address .
Which of the following BEST describes what happened?

正解:

Question No : 3
A penetration tester runs a scan against a server and obtains the following output:
21/tcp open ftp Microsoft ftpd
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
| 03-12-20 09:23AM 331 index.aspx
| ftp-syst:
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn 445/tcp open microsoft-ds Microsoft Windows Server 2012 Std 3389/tcp open ssl/ms-wbt-server | rdp-ntlm-info:
| Target Name: WEB3
| NetBIOS_Computer_Name: WEB3
| Product_Version: 6.3.9600
|_ System_Time: 2021-01-15T11:32:06+00:00 8443/tcp open http Microsoft IIS httpd 8.5
| http-methods:
|_ Potentially risky methods: TRACE
|_http-server-header: Microsoft-IIS/8.5
|_http-title: IIS Windows Server
Which of the following command sequences should the penetration tester try NEXT?

正解:

Question No : 4
A compliance-based penetration test is primarily concerned with:

正解:

Question No : 5
A security engineer identified a new server on the network and wants to scan the host to determine if it is running an approved version of Linux and a patched version of Apache .
Which of the following commands will accomplish this task?

正解:
Explanation:
Reference: https://nmap.org/book/man-version-detection.html

Question No : 6
A penetration tester ran a ping CA command during an unknown environment test, and it returned a 128 TTL packet .
Which of the following OSs would MOST likely return a packet of this type?

正解:
Explanation:
Reference: https://www.freecodecamp.org/news/how-to-identify-basic-internet-problems-with-ping/

Question No : 7
A penetration tester recently performed a social-engineering attack in which the tester found an employee of the target company at a local coffee shop and over time built a relationship with the employee. On the employee’s birthday, the tester gave the employee an external hard drive as a gift .
Which of the following social-engineering attacks was the tester utilizing?

正解:
Explanation:
Reference: https://phoenixnap.com/blog/what-is-social-engineering-types-of-threats

Question No : 8
A penetration tester was brute forcing an internal web server and ran a command that produced the following output:



However, when the penetration tester tried to browse the URL
http://172.16.100.10:3000/profile, a blank page was displayed.
Which of the following is the MOST likely reason for the lack of output?

正解:

Question No : 9
A penetration tester is preparing to perform activities for a client that requires minimal disruption to company operations .
Which of the following are considered passive reconnaissance tools? (Choose two.)

正解:
Explanation:
Reference: https://resources.infosecinstitute.com/topic/top-10-network-recon-tools/

Question No : 10
A penetration tester received a .pcap file to look for credentials to use in an engagement.
Which of the following tools should the tester utilize to open and read the .pcap file?

正解:

Question No : 11
A penetration tester has been contracted to review wireless security. The tester has deployed a malicious wireless AP that mimics the configuration of the target enterprise WiFi. The penetration tester now wants to try to force nearby wireless stations to connect to the malicious AP .
Which of the following steps should the tester take NEXT?

正解:

Question No : 12
A company is concerned that its cloud service provider is not adequately protecting the VMs housing its software development. The VMs are housed in a datacenter with other companies sharing physical resources .
Which of the following attack types is MOST concerning to the company?

正解:
Explanation:
Reference: https://www.iotcentral.io/blog/the-top-cloud-computing-vulnerabilities-and-threats

Question No : 13
A penetration tester has established an on-path attack position and must now specially craft a DNS query response to be sent back to a target host .
Which of the following utilities would BEST support this objective?

正解:
Explanation:
Reference: https://unix.stackexchange.com/QUESTION NO:s/520348/using-socat-how-to-send-to-and-receive-from-a- public-dns-server

Question No : 14
A penetration tester exploited a unique flaw on a recent penetration test of a bank. After the test was completed, the tester posted information about the exploit online along with the IP addresses of the exploited machines .
Which of the following documents could hold the penetration tester accountable for this action?

正解:

Question No : 15
A penetration tester who is conducting a web-application test discovers a clickjacking vulnerability associated with a login page to financial data .
Which of the following should the tester do with this information to make this a successful exploit?

正解:

 / 4