Practice Free PT0-002 Exam Online Questions
Question #130
A penetration tester completed an assessment, removed all artifacts and accounts created during the test, and presented the findings to the client.
Which of the following happens NEXT?
- A . The penetration tester conducts a retest.
- B . The penetration tester deletes all scripts from the client machines.
- C . The client applies patches to the systems.
- D . The client clears system logs generated during the test.
Correct Answer: C
Question #132
A security analyst is conducting an unknown environment test from 192.168 3.3. The analyst wants to limit observation of the penetration tester’s activities and lower the probability of detection by intrusion protection and detection systems.
Which of the following Nmap commands should the analyst use to achieve This objective?
- A . Nmap CF 192.168.5.5
- B . Map Cdatalength 2.192.168.5.5
- C . Nmap CD 10.5.2.2.168.5.5
- D . Map Cscanflags SYNFIN 192.168.5.5
Correct Answer: C
C
Explanation:
Based on the goal of limiting observation of the penetration tester’s activities and lowering the probability of detection by intrusion protection and detection systems, the best option among the provided ones, after correcting for clarity and syntax, would be:
Option C (corrected for proper decoy usage): Using decoy IP addresses with Nmap’s -D option.
A corrected command that uses decoys effectively to evade detection while scanning 192.168.5.5 might look like this:
nmap -D decoy1,decoy2,ME 192.168.5.5
In this command, decoy1 and decoy2 are fake IP addresses you’re using as decoys, and ME represents your actual scanning machine (placed among decoys to hide its presence). Remember to replace decoy1 and decoy2 with actual IP addresses that serve as plausible decoys. This method makes the penetration testing activities harder to trace back to you by including other source IP addresses in the packets sent to the target.
C
Explanation:
Based on the goal of limiting observation of the penetration tester’s activities and lowering the probability of detection by intrusion protection and detection systems, the best option among the provided ones, after correcting for clarity and syntax, would be:
Option C (corrected for proper decoy usage): Using decoy IP addresses with Nmap’s -D option.
A corrected command that uses decoys effectively to evade detection while scanning 192.168.5.5 might look like this:
nmap -D decoy1,decoy2,ME 192.168.5.5
In this command, decoy1 and decoy2 are fake IP addresses you’re using as decoys, and ME represents your actual scanning machine (placed among decoys to hide its presence). Remember to replace decoy1 and decoy2 with actual IP addresses that serve as plausible decoys. This method makes the penetration testing activities harder to trace back to you by including other source IP addresses in the packets sent to the target.
Question #133
Which of the following documents should be consulted if a client has an issue accepting a penetration test report that was provided?
- A . Rules of engagement
- B . Signed authorization letter
- C . Statement of work
- D . Non-disclosure agreement
Correct Answer: C
C
Explanation:
The Statement of Work typically outlines the scope of the project, specific deliverables, timelines, and the expectations for both parties. It should detail what the penetration testing will cover, how results will be reported, and any criteria for accepting the final report. This document can help clarify any misunderstandings or discrepancies regarding the expectations and deliverables of the penetration test.
C
Explanation:
The Statement of Work typically outlines the scope of the project, specific deliverables, timelines, and the expectations for both parties. It should detail what the penetration testing will cover, how results will be reported, and any criteria for accepting the final report. This document can help clarify any misunderstandings or discrepancies regarding the expectations and deliverables of the penetration test.