CompTIA PT0-002 Exam (page: 19)
CompTIA PenTest+ Certification
Updated on: 01-Sep-2025

Viewing Page 19 of 105

A CentOS computer was exploited during a penetration test. During initial reconnaissance, the penetration tester discovered that port 25 was open on an internal
Sendmail server. To remain stealthy, the tester ran the following command from the attack machine:
Which of the following would be the BEST command to use for further progress into the targeted network?

  1. nc 10.10.1.2
  2. ssh 10.10.1.2
  3. nc 127.0.0.1 5555
  4. ssh 127.0.0.1 5555

Answer(s): C



A penetration tester utilized Nmap to scan host 64.13.134.52 and received the following results:
Based on the output, which of the following services are MOST likely to be exploited? (Choose two.)

  1. Telnet
  2. HTTP
  3. SMTP
  4. DNS
  5. NTP
  6. SNMP

Answer(s): B,D



Which of the following expressions in Python increase a variable val by one? (Choose two.)

  1. val++
  2. +val
  3. val=(val+1)
  4. ++val
  5. val=val++
  6. val+=1

Answer(s): C,F



An assessor wants to run an Nmap scan as quietly as possible. Which of the following commands will give the LEAST chance of detection?

  1. nmap ג€"T3 192.168.0.1
  2. nmap ג€"P0 192.168.0.1
  3. nmap ג€"T0 192.168.0.1
  4. nmap ג€"A 192.168.0.1

Answer(s): C



A penetration tester wrote the following script to be used in one engagement:
Which of the following actions will this script perform?

  1. Look for open ports.
  2. Listen for a reverse shell.
  3. Attempt to flood open ports.
  4. Create an encrypted tunnel.

Answer(s): A



Viewing Page 19 of 105



Share your comments for CompTIA PT0-002 exam with other users:

SAJI 7/20/2023 2:51:00 AM

56 question correct answer a,b
Anonymous


Summer 10/4/2023 9:57:00 PM

looking forward to the real exam
Anonymous