100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

PT0-002 Practice Exam Questions and Answers 100% GRADE A+ GUARANTEED

Puntuación
-
Vendido
-
Páginas
66
Grado
A+
Subido en
17-05-2024
Escrito en
2023/2024

Question # 1 Which of the following is the MOST common vulnerability associated with IoT devices that are directly connected to the Internet? Options: A.   Unsupported operating systems B.   Susceptibility to DDoS attacks C.   Inability to network D.   The existence of default passwords Question # 2 Which of the following should a penetration tester do NEXT after identifying that an application being tested has already been compromised with malware? Options: A.   Analyze the malware to see what it does. B.   Collect the proper evidence and then remove the malware. C.   Do a root-cause analysis to find out how the malware got in. D.   Remove the malware immediately. E.   Stop the assessment and inform the emergency contact. Question # 3 Which of the following should a penetration tester do NEXT after identifying that an application being tested has already been compromised with malware? Options: A.   Root user B.   Local administrator C.   Service D.   Network administrator Question # 4 A penetration tester has gained access to part of an internal network and wants to exploit on a different network segment. Using Scapy, the tester runs the following command: Which of the following represents what the penetration tester is attempting to accomplish? Options: A.   DNS cache poisoning B.   MAC spoofing C.   ARP poisoning D.   Double-tagging attack Question # 5 A penetration tester has completed an analysis of the various software products produced by the company under assessment. The tester found that over the past several years the company has been including vulnerable third-party modules in multiple products, even though the quality of the organic code being developed is very good. Which of the following recommendations should the penetration tester include in the report? Options: A.   Add a dependency checker into the tool chain. B.   Perform routine static and dynamic analysis of committed code. C.   Validate API security settings before deployment. D.   Perform fuzz testing of compiled binaries. Question # 6 Which of the following BEST describe the OWASP Top 10? (Choose two.) Options: A.   The most critical risks of web applications B.   A list of all the risks of web applications C.   The risks defined in order of importance D.   A web-application security standard E.   A risk-governance and compliance framework F.   A checklist of Apache vulnerabilities Question # 7 The results of an Nmap scan are as follows: Starting Nmap 7.80 ( ) at :10 EST Nmap scan report for ( 10.2.1.22 ) Host is up (0.0102s latency). Not shown: 998 filtered ports Port State Service 80/tcp open http |_http-title: 80F 22% RH 1009.1MB (text/html) |_http-slowloris-check: | VULNERABLE: | Slowloris DoS Attack | <..> Device type: bridge|general purpose CONTINUED......

Mostrar más Leer menos
Institución
Grado











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Grado

Información del documento

Subido en
17 de mayo de 2024
Número de páginas
66
Escrito en
2023/2024
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

PT0-002 Practice Exam Questions
and Answers 100% GRADE A+
GUARANTEED


Question # 1

Which of the following is the MOST common vulnerability associated with IoT
devices that are directly connected to the Internet?

Options:

A.

Unsupported operating systems

B.

Susceptibility to DDoS attacks

C.

Inability to network

D.

The existence of default passwords

Question # 2

Which of the following should a penetration tester do NEXT after identifying that an
application being tested has already been compromised with malware?

Options:

A.

Analyze the malware to see what it does.

B.

Collect the proper evidence and then remove the malware.

,C.

Do a root-cause analysis to find out how the malware got in.

D.

Remove the malware immediately.

E.

Stop the assessment and inform the emergency contact.

Question # 3

A penetration tester has been hired to configure and conduct authenticated scans of all
the servers on a software company’s network. Which of the following accounts
should the tester use to return the MOST results?

Options:

A.

Root user

B.

Local administrator

C.

Service

D.

Network administrator

Question # 4

A penetration tester has gained access to part of an internal network and wants to
exploit on a different network segment. Using Scapy, the tester runs the following
command:




Which of the following represents what the penetration tester is attempting to
accomplish?

Options:

,A.

DNS cache poisoning

B.

MAC spoofing

C.

ARP poisoning

D.

Double-tagging attack

Question # 5

A penetration tester has completed an analysis of the various software products
produced by the company under assessment. The tester found that over the past
several years the company has been including vulnerable third-party modules in
multiple products, even though the quality of the organic code being developed is
very good. Which of the following recommendations should the penetration tester
include in the report?

Options:

A.

Add a dependency checker into the tool chain.

B.

Perform routine static and dynamic analysis of committed code.

C.

Validate API security settings before deployment.

D.

Perform fuzz testing of compiled binaries.

Question # 6

Which of the following BEST describe the OWASP Top 10? (Choose two.)

Options:

, A.

The most critical risks of web applications

B.

A list of all the risks of web applications

C.

The risks defined in order of importance

D.

A web-application security standard

E.

A risk-governance and compliance framework

F.

A checklist of Apache vulnerabilities

Question # 7

The results of an Nmap scan are as follows:

Starting Nmap 7.80 ( https://nmap.org ) at 2021-01-24 01:10 EST

Nmap scan report for ( 10.2.1.22 )

Host is up (0.0102s latency).

Not shown: 998 filtered ports

Port State Service

80/tcp open http

|_http-title: 80F 22% RH 1009.1MB (text/html)

|_http-slowloris-check:

| VULNERABLE:

| Slowloris DoS Attack

| <..>
$15.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
munyuabeatrice92

Conoce al vendedor

Seller avatar
munyuabeatrice92 K
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
1
Miembro desde
2 año
Número de seguidores
1
Documentos
347
Última venta
1 año hace

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes