CompTIA PT0-002 CompTIA PenTest+ Certification Exam Practice Test

Page:    1 / 14   
Total 110 questions

Question 1

Which of the following should a penetration tester attack to gain control of the state in the HTTP protocol after the user is logged in?

Answer : D

Question 2

A software company has hired a penetration tester to perform a penetration test on a database server. The tester has been given a variety of tools used by the company's privacy policy. Which of the following would be the BEST to use to find vulnerabilities on this server?

Answer : C

Question 3

A penetration tester was able to gain access successfully to a Windows workstation on a mobile client's laptop. Which of the following can be used to ensure the tester is able to maintain access to the system?

Answer : B

Question 4

A large client wants a penetration tester to scan for devices within its network that are Internet facing. The client is specifically looking for Cisco devices with no authentication requirements. Which of the following settings in Shodan would meet the client's requirements?

Answer : A

Question 5

A tester who is performing a penetration test on a website receives the following output:

Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /var/www/search.php on line 62

Which of the following commands can be used to further attack the website?

Answer : C

Page:    1 / 14   
Total 110 questions