Free CompTIA PT0-002 Exam Braindumps (page: 16)

Which of the following protocols or technologies would in-transit confidentially protection for emailing the final security assessment report?

  1. S/MIME
  2. FTPS
  3. DNSSEC
  4. AS2

Answer(s): A



A penetration tester was able to gather MD5 hashes from a server and crack the hashes easily with rainbow tables.
Which of the following should be included as a recommendation in the remediation report?

  1. Stronger algorithmic requirements
  2. Access controls on the server
  3. Encryption on the user passwords
  4. A patch management program

Answer(s): A



A penetration tester found the following valid URL while doing a manual assessment of a web application: http://www.example.com/product.php?id=123987.
Which of the following automated tools would be best to use NEXT to try to identify a vulnerability in this URL?

  1. SQLmap
  2. Nessus
  3. Nikto
  4. DirBuster

Answer(s): A



A penetration tester is attempting to discover live hosts on a subnet quickly.
Which of the following commands will perform a ping scan?

  1. nmap -sn 10.12.1.0/24
  2. nmap -sV -A 10.12.1.0/24
  3. nmap -Pn 10.12.1.0/24
  4. nmap -sT -p- 10.12.1.0/24

Answer(s): A


Reference:

https://www.tecmint.com/find-live-hosts-ip-addresses-on-linux-network/



Viewing page 16 of 131
Viewing questions 61 - 64 out of 520 questions



Post your Comments and Discuss CompTIA PT0-002 exam prep with other Community members:

PT0-002 Exam Discussions & Posts