PT0-002認定の有効な試験問題集解答学習ガイド!(最新の280問題) [Q111-Q127]

Share

PT0-002認定の有効な試験問題集解答学習ガイド!(最新の280問題)

PT0-002問題集で時間限定!無料アクセスせよ


CompTIA PenTest 認定は、サイバーセキュリティの専門家のペネトレーションテストに関する能力と知識をテストするために特に設計された包括的な資格です。ペンテスターや脆弱性管理アナリストなどのサイバーセキュリティの専門家として働くために準備します。この認定は、範囲の計画と開発、さまざまな侵入テスト戦略の管理と報告、ペンテストに関連するコンプライアンスと規制など、ほとんどのコアトピックをカバーしています。


CompTIA PenTest認定試験は、ペネトレーションテストで使用される最新の技術と手法をカバーする包括的な認定試験です。この試験は、倫理的ハッキングとペネトレーションテストの分野での熟練度を示したいプロフェッショナルを対象としています。また、サイバーセキュリティの脅威とテクノロジーの変化について最新の情報を把握したい人にも最適です。この認定を取得することで、プロフェッショナルは自分のスキルを潜在的な雇用主やクライアントに証明し、業界での雇用可能性と信頼性を高めることができます。

 

質問 # 111
A penetration tester is reviewing the following SOW prior to engaging with a client:
"Network diagrams, logical and physical asset inventory, and employees' names are to be treated as client confidential. Upon completion of the engagement, the penetration tester will submit findings to the client's Chief Information Security Officer (CISO) via encrypted protocols and subsequently dispose of all findings by erasing them in a secure manner." Based on the information in the SOW, which of the following behaviors would be considered unethical? (Choose two.)

  • A. Using a software-based erase tool to wipe the client's findings from the penetration tester's laptop
  • B. Failing to share with the client critical vulnerabilities that exist within the client architecture to appease the client's senior leadership team
  • C. Utilizing public-key cryptography to ensure findings are delivered to the CISO upon completion of the engagement
  • D. Utilizing proprietary penetration-testing tools that are not available to the public or to the client for auditing and inspection
  • E. Seeking help with the engagement in underground hacker forums by sharing the client's public IP address
  • F. Retaining the SOW within the penetration tester's company for future use so the sales team can plan future engagements

正解:A、B


質問 # 112
A CentOS computer was exploited during a penetration test. During initial reconnaissance, the penetration tester discovered that port 25 was open on an internal Sendmail server. To remain stealthy, the tester ran the following command from the attack machine:

Which of the following would be the BEST command to use for further progress into the targeted network?

  • A. nc 127.0.0.1 5555
  • B. ssh 127.0.0.1 5555
  • C. ssh 10.10.1.2
  • D. nc 10.10.1.2

正解:A


質問 # 113
During a penetration-testing engagement, a consultant performs reconnaissance of a client to identify potential targets for a phishing campaign. Which of the following would allow the consultant to retrieve email addresses for technical and billing contacts quickly, without triggering any of the client's cybersecurity tools? (Choose two.)

  • A. Scraping social media sites
  • B. Phishing company employees
  • C. Crawling the client's website
  • D. Using the WHOIS lookup tool
  • E. Utilizing DNS lookup tools
  • F. Conducting wardriving near the client facility

正解:A、C

解説:
Technical and billing addresses are usually posted on company websites and company social media sites for the their clients to access. The WHOIS lookup will only avail info for the company registrant, an abuse email contact, etc but it may not contain details for billing addresses.


質問 # 114
During the reconnaissance phase, a penetration tester obtains the following output:
Reply from 192.168.1.23: bytes=32 time<54ms TTL=128
Reply from 192.168.1.23: bytes=32 time<53ms TTL=128
Reply from 192.168.1.23: bytes=32 time<60ms TTL=128
Reply from 192.168.1.23: bytes=32 time<51ms TTL=128
Which of the following operating systems is MOST likely installed on the host?

  • A. Windows
  • B. Linux
  • C. NetBSD
  • D. macOS

正解:A


質問 # 115
A company hired a penetration-testing team to review the cyber-physical systems in a manufacturing plant.
The team immediately discovered the supervisory systems and PLCs are both connected to the company intranet. Which of the following assumptions, if made by the penetration-testing team, is MOST likely to be valid?

  • A. Controllers will not validate the origin of commands.
  • B. Supervisory systems will detect a malicious injection of code/commands.
  • C. Supervisors and controllers are on a separate virtual network by default.
  • D. PLCs will not act upon commands injected over the network.

正解:A


質問 # 116
A red team gained access to the internal network of a client during an engagement and used the Responder tool to capture important dat a. Which of the following was captured by the testing team?

  • A. User hashes sent over SMB
  • B. Encrypted file transfers
  • C. Multiple handshakes
  • D. IP addresses

正解:D


質問 # 117
Penetration tester has discovered an unknown Linux 64-bit executable binary. Which of the following tools would be BEST to use to analyze this issue?

  • A. WinDbg
  • B. Peach
  • C. GDB
  • D. OllyDbg

正解:C

解説:
OLLYDBG, WinDBG, and IDA are all debugging tools that support Windows environments. GDB is a Linux-specific debugging tool.


質問 # 118
You are a penetration tester reviewing a client's website through a web browser.
INSTRUCTIONS
Review all components of the website through the browser to determine if vulnerabilities are present.
Remediate ONLY the highest vulnerability from either the certificate, source, or cookies.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.






正解:

解説:


質問 # 119
Which of the following would assist a penetration tester the MOST when evaluating the susceptibility of top-level executives to social engineering attacks?

  • A. Registering domain names that are similar to the target company's
  • B. Scraping social media for personal details
  • C. Crawling the company's website for company information
  • D. Identifying technical contacts at the company

正解:B


質問 # 120
A penetration tester is looking for vulnerabilities within a company's web application that are in scope. The penetration tester discovers a login page and enters the following string in a field:
1;SELECT Username, Password FROM Users;
Which of the following injection attacks is the penetration tester using?

  • A. Boolean SQL
  • B. Stacked queries
  • C. Error-based
  • D. Blind SQL

正解:C


質問 # 121
Appending string values onto another string is called:

  • A. concatenation
  • B. conjunction
  • C. connection
  • D. compilation

正解:A


質問 # 122
A final penetration test report has been submitted to the board for review and accepted. The report has three findings rated high. Which of the following should be the NEXT step?

  • A. Broaden the scope of the penetration test.
  • B. Perform a new penetration test.
  • C. Provide the list of common vulnerabilities and exposures.
  • D. Remediate the findings.

正解:D


質問 # 123
Which of the following expressions in Python increase a variable val by one (Choose two.)

  • A. val+=1
  • B. ++val
  • C. +val
  • D. val++
  • E. val=(val+1)
  • F. val=val++

正解:A、E

解説:
Explanation
https://pythonguides.com/increment-and-decrement-operators-in-python/


質問 # 124
A penetration tester is starting an assessment but only has publicly available information about the target company. The client is aware of this exercise and is preparing for the test.
Which of the following describes the scope of the assessment?

  • A. Partially known environment testing
  • B. Known environment testing
  • C. Unknown environment testing
  • D. Physical environment testing

正解:C


質問 # 125
A penetration tester has obtained root access to a Linux-based file server and would like to maintain persistence after reboot. Which of the following techniques would BEST support this objective?

  • A. Move laterally to create a user account on LDAP
  • B. Create a one-shot systemd service to establish a reverse shell.
  • C. Obtain /etc/shadow and brute force the root password.
  • D. Run the nc -e /bin/sh <...> command.

正解:B

解説:
https://hosakacorp.net/p/systemd-user.html


質問 # 126
A new security firm is onboarding its first client. The client only allowed testing over the weekend and needed the results Monday morning. However, the assessment team was not able to access the environment as expected until Monday. Which of the following should the security company have acquired BEFORE the start of the assessment?

  • A. The proper emergency contacts for the client
  • B. A signed statement of work
  • C. The correct user accounts and associated passwords
  • D. The expected time frame of the assessment

正解:D


質問 # 127
......


CompTIA PT0-002 PenTest 認定試験は、倫理的ハッキングやその他のセキュリティテスト活動を実施する能力と知識を検証するための貴重で高く評価されている認定です。この認定により、候補者はデジタルフォレンジックス、脆弱性スキャン、ペネトレーションテストなどの専門知識をアピールすることができます。これらの活動は、安全かつ安定したコンピューターシステム、ネットワーク、アプリケーションを維持する上で重要なタスクとなっています。

 

CompTIA PT0-002試験実践テスト問題:https://www.jpntest.com/shiken/PT0-002-mondaishu

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡