CompTIA PT0-002 - CompTIA PenTest+ Certification Exam Exam

Page:    1 / 81   
Total 403 questions

Which of the following commands will allow a penetration tester to permit a shell script to be executed by the file owner?

  • A. chmod u+x script.sh
  • B. chmod u+e script.sh
  • C. chmod o+e script.sh
  • D. chmod o+x script.sh


Answer : A

A penetration tester gains access to a system and establishes persistence, and then run the following commands:

Which of the following actions is the tester MOST likely performing?

  • A. Redirecting Bash history to /dev/null
  • B. Making a copy of the userג€™s Bash history to further enumeration
  • C. Covering tracks by clearing the Bash history
  • D. Making decoy files on the system to confuse incident responders


Answer : C

A compliance-based penetration test is primarily concerned with:

  • A. obtaining PII from the protected network.
  • B. bypassing protection on edge devices.
  • C. determining the efficacy of a specific set of security standards.
  • D. obtaining specific information from the protected network.


Answer : C

A penetration tester is explaining the MITRE ATT&CK framework to a company's chief legal counsel.
Which of the following would the tester MOST likely describe as a benefit of the framework?

  • A. Understanding the tactics of a security intrusion can help disrupt them.
  • B. Scripts that are part of the framework can be imported directly into SIEM tools.
  • C. The methodology can be used to estimate the cost of an incident better.
  • D. The framework is static and ensures stability of a security program over time.


Answer : A

Which of the following BEST describe the OWASP Top 10? (Choose two.)

  • A. The most critical risks of web applications
  • B. A list of all the risks of web applications
  • C. The risks defined in order of importance
  • D. A web-application security standard
  • E. A risk-governance and compliance framework
  • F. A checklist of Apache vulnerabilities


Answer : AC

Page:    1 / 81   
Total 403 questions