Free CompTIA PT0-002 Exam Braindumps (page: 21)

A penetration tester gains access to a system and is able to migrate to a user process:
Given the output above, which of the following actions is the penetration tester performing? (Choose two.)

  1. Redirecting output from a file to a remote system
  2. Building a scheduled task for execution
  3. Mapping a share to a remote system
  4. Executing a file on the remote system
  5. Creating a new process on all domain systems
  6. Setting up a reverse shell from a remote system
  7. Adding an additional IP address on the compromised system

Answer(s): C,D



After gaining access to a previous system, a penetration tester runs an Nmap scan against a network with the following results:
The tester then runs the following command from the previous exploited system, which fails:
Which of the following explains the reason why the command failed?

  1. The tester input the incorrect IP address.
  2. The command requires the ג€"port 135 option.
  3. An account for RDP does not exist on the server.
  4. PowerShell requires administrative privilege.

Answer(s): A



Which of the following assessment methods is MOST likely to cause harm to an ICS environment?

  1. Active scanning
  2. Ping sweep
  3. Protocol reversing
  4. Packet analysis

Answer(s): A



During a penetration test, a tester is in close proximity to a corporate mobile device belonging to a network administrator that is broadcasting Bluetooth frames.
Which of the following is an example of a Bluesnarfing attack that the penetration tester can perform?

  1. Sniff and then crack the WPS PIN on an associated WiFi device.
  2. Dump the user address book on the device.
  3. Break a connection between two Bluetooth devices.
  4. Transmit text messages to the device.

Answer(s): B



Viewing page 21 of 131
Viewing questions 81 - 84 out of 520 questions



Post your Comments and Discuss CompTIA PT0-002 exam prep with other Community members:

PT0-002 Exam Discussions & Posts