CompTIA PenTest+ PT0-002 Certification Practice Questions

Question 1
Which of the following should a penetration tester attack to gain control of the state in the HTTP protocol after the user is logged in?

A. HTTPS communication
B. Public and private keys
C. Password encryption
D. Sessions and cookies


Question 2
A penetration tester exploited a unique flaw on a recent penetration test of a bank. After the test was completed, the tester posted information about the exploit online along with the IP addresses of the exploited machines. Which of the following documents could hold the penetration tester accountable for this action?

A. ROE
B. SLA
C. MSA
D. NDA


Question 3
A penetration tester conducted a vulnerability scan against a client's critical servers and found the following:

Host name Ispan OS Security uspandates
addc01.local 10.1.1.20 Windows Server 2012 KB4581001, KB4585587, KB4586007
addc02.local 10.1.1.21 Windows Server 2012 KB4586007
dnsint.local 10.1.1.22 Windows Server 2012 KB4581001, KB4585587, KB4586007, KB4586010
wwwint.local 10.1.1.23 Windows Server 2012 KB4581001


Which of the following would be a recommendation for remediation?

A.    Deploy a user training program.
B.    Implement a patch management plan.
C.    Utilize the secure software development life cycle.
D.    Configure access controls on each of the servers.


Question 4
A client requires all penetration testers to sign an NDA before beginning an assessment. Which of the following explains the reason why the client would require this?

A. To establish the rules of engagement for the assessment
B. To establish a proper communication channel during the assessment 
C. To protect information that may be disclosed during the assessment
D. To acknowledge the assessment deliverables


Question 5
A penetration tester discovers a system that appears to be exfiltrating data and reports it to the management team. Further investigation reveals malware artifacts have been residing on the host for some time. Which of the following BEST describes what the tester discovered? 

A. A system software bug
B. Critical system vulnerabilities
C. Indicators of prior compromise
D. Malicious database login attempts


Question 6
A penetration tester who is performing a physical assessment of a company's security practices notices the company does not have any shredders inside the office building. Which of the following techniques would be BEST to use to gain confidential information?

A. Badge cloning
B. Dumpster diving
C. Tailgating
D. Shoulder surfing


Question 7
A penetration-testing team is conducting a physical penetration test to gain entry to a building. Which of the following is the reason why the penetration testers should carry copies of the engagement documents with them?

A. As backup in case the original documents are lost
B. To guide them through the building entrances
C. To validate the billing information with the client
D. As proof in case they are discovered


Question 8
A penetration tester ran an Nmap scan and received the following results:

 Host script results:
 | smb-vuln-ms17-010:
 |  VULNERABLE:
 |  Remote Code Execution vulnerability in Microsoft SMBv1 servers (ms17-010)
 |   State: VULNERABLE
 |   IDs: CVE:CVE-2017-0143 (EternalBlue)
 |   Risk factor: HIGH
 |    A critical remote code execution vulnerability exists in Microsoft SMBv1
 |     servers (ms17-010).

 Which of the following tools is BEST suited to exploit and validate the vulnerability on the server?

A. Metasploit 
B. RouterSploit
C. SQLmap
D. JexBoss


Question 9
A penetration tester uses dirbuster on a website and discovers a directory called wp-includes.  Which of the following is the BEST tool the penetration tester could use to further enumerate the website?

A. Nikto
B. WPScan
C. Nessus
D. Searchsploit


Question 10
Which of the following is the BEST recommendation for preventing SQL injection attacks?

A. Output encoding
B. Parameterized queries
C. URL encoding
D. Input validation


PenTest+ PT0-002 Answer Key

Question 1) D. Sessions and Cookies

Question 2) D. NDA

Question 3) B. Implement a patch management plan

Question 4) C. To protect information that may be disclosed during the assessment

Question 5) C. Indicators of prior compromise

Question 6) B. Dumpster diving

Question 7) D. As proof in case they are discovered

Question 8) A. Metasploit 

Question 9) B. WPScan

Question 10) B. Parameterized queries