100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

PT0-002 Practice Exam Questions and Answers 100% GRADE A+ GUARANTEED

Rating
-
Sold
-
Pages
66
Grade
A+
Uploaded on
17-05-2024
Written in
2023/2024

Question # 1 Which of the following is the MOST common vulnerability associated with IoT devices that are directly connected to the Internet? Options: A.   Unsupported operating systems B.   Susceptibility to DDoS attacks C.   Inability to network D.   The existence of default passwords Question # 2 Which of the following should a penetration tester do NEXT after identifying that an application being tested has already been compromised with malware? Options: A.   Analyze the malware to see what it does. B.   Collect the proper evidence and then remove the malware. C.   Do a root-cause analysis to find out how the malware got in. D.   Remove the malware immediately. E.   Stop the assessment and inform the emergency contact. Question # 3 Which of the following should a penetration tester do NEXT after identifying that an application being tested has already been compromised with malware? Options: A.   Root user B.   Local administrator C.   Service D.   Network administrator Question # 4 A penetration tester has gained access to part of an internal network and wants to exploit on a different network segment. Using Scapy, the tester runs the following command: Which of the following represents what the penetration tester is attempting to accomplish? Options: A.   DNS cache poisoning B.   MAC spoofing C.   ARP poisoning D.   Double-tagging attack Question # 5 A penetration tester has completed an analysis of the various software products produced by the company under assessment. The tester found that over the past several years the company has been including vulnerable third-party modules in multiple products, even though the quality of the organic code being developed is very good. Which of the following recommendations should the penetration tester include in the report? Options: A.   Add a dependency checker into the tool chain. B.   Perform routine static and dynamic analysis of committed code. C.   Validate API security settings before deployment. D.   Perform fuzz testing of compiled binaries. Question # 6 Which of the following BEST describe the OWASP Top 10? (Choose two.) Options: A.   The most critical risks of web applications B.   A list of all the risks of web applications C.   The risks defined in order of importance D.   A web-application security standard E.   A risk-governance and compliance framework F.   A checklist of Apache vulnerabilities Question # 7 The results of an Nmap scan are as follows: Starting Nmap 7.80 ( ) at :10 EST Nmap scan report for ( 10.2.1.22 ) Host is up (0.0102s latency). Not shown: 998 filtered ports Port State Service 80/tcp open http |_http-title: 80F 22% RH 1009.1MB (text/html) |_http-slowloris-check: | VULNERABLE: | Slowloris DoS Attack | <..> Device type: bridge|general purpose CONTINUED......

Show more Read less
Institution
Module











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Module

Document information

Uploaded on
May 17, 2024
Number of pages
66
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

PT0-002 Practice Exam Questions
and Answers 100% GRADE A+
GUARANTEED


Question # 1

Which of the following is the MOST common vulnerability associated with IoT
devices that are directly connected to the Internet?

Options:

A.

Unsupported operating systems

B.

Susceptibility to DDoS attacks

C.

Inability to network

D.

The existence of default passwords

Question # 2

Which of the following should a penetration tester do NEXT after identifying that an
application being tested has already been compromised with malware?

Options:

A.

Analyze the malware to see what it does.

B.

Collect the proper evidence and then remove the malware.

,C.

Do a root-cause analysis to find out how the malware got in.

D.

Remove the malware immediately.

E.

Stop the assessment and inform the emergency contact.

Question # 3

A penetration tester has been hired to configure and conduct authenticated scans of all
the servers on a software company’s network. Which of the following accounts
should the tester use to return the MOST results?

Options:

A.

Root user

B.

Local administrator

C.

Service

D.

Network administrator

Question # 4

A penetration tester has gained access to part of an internal network and wants to
exploit on a different network segment. Using Scapy, the tester runs the following
command:




Which of the following represents what the penetration tester is attempting to
accomplish?

Options:

,A.

DNS cache poisoning

B.

MAC spoofing

C.

ARP poisoning

D.

Double-tagging attack

Question # 5

A penetration tester has completed an analysis of the various software products
produced by the company under assessment. The tester found that over the past
several years the company has been including vulnerable third-party modules in
multiple products, even though the quality of the organic code being developed is
very good. Which of the following recommendations should the penetration tester
include in the report?

Options:

A.

Add a dependency checker into the tool chain.

B.

Perform routine static and dynamic analysis of committed code.

C.

Validate API security settings before deployment.

D.

Perform fuzz testing of compiled binaries.

Question # 6

Which of the following BEST describe the OWASP Top 10? (Choose two.)

Options:

, A.

The most critical risks of web applications

B.

A list of all the risks of web applications

C.

The risks defined in order of importance

D.

A web-application security standard

E.

A risk-governance and compliance framework

F.

A checklist of Apache vulnerabilities

Question # 7

The results of an Nmap scan are as follows:

Starting Nmap 7.80 ( https://nmap.org ) at 2021-01-24 01:10 EST

Nmap scan report for ( 10.2.1.22 )

Host is up (0.0102s latency).

Not shown: 998 filtered ports

Port State Service

80/tcp open http

|_http-title: 80F 22% RH 1009.1MB (text/html)

|_http-slowloris-check:

| VULNERABLE:

| Slowloris DoS Attack

| <..>
£11.91
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
munyuabeatrice92

Get to know the seller

Seller avatar
munyuabeatrice92 K
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
2 year
Number of followers
1
Documents
347
Last sold
1 year ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions