Free PT0-002 Exam Braindumps (page: 4)

Page 3 of 93

A penetration tester was able to gain access to a system using an exploit. The following is a snippet of the code that was utilized:



Which of the following commands should the penetration tester run post-engagement?

  1. grep -v apache ~/bash_history> ~/.bash_history
  2. rm -rf /tmp/apache
  3. chmod 600 /tmp/apache
  4. taskkill /IM ג€apacheג€ /F

Answer(s): B



Which of the following is MOST important to include in the final report of a static application-security test that was written with a team of application developers as the intended audience?

  1. Executive summary of the penetration-testing methods used
  2. Bill of materials including supplies, subcontracts, and costs incurred during assessment
  3. Quantitative impact assessments given a successful software compromise
  4. Code context for instances of unsafe typecasting operations

Answer(s): D



SIMULATION
You are a penetration tester reviewing a client's website through a web browser.

INSTRUCTIONS
Review all components of the website through the browser to determine if vulnerabilities are present.
Remediate ONLY the highest vulnerability from either the certificate, source, or cookies.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.













  1. See Explanation section for answer.

Answer(s): A

Explanation:

Step 1: Generate Certificate Signing Request
Step 2: Submit CSR to the CA -
Step 3: Remove certificate from the server
Step 4: Install re-issued certificate on the server



A Chief Information Security Officer wants a penetration tester to evaluate the security awareness level of the company's employees.
Which of the following tools can help the tester achieve this goal?

  1. Metasploit
  2. Hydra
  3. SET
  4. WPScan

Answer(s): C






Post your Comments and Discuss CompTIA PT0-002 exam with other Community members:

PT0-002 Discussions & Posts