PT0-002 Exam Question 1
A penetration tester was contracted to test a proprietary application for buffer overflow vulnerabilities. Which of the following tools would be BEST suited for this task?
PT0-002 Exam Question 2
A penetration tester who is performing an engagement notices a specific host is vulnerable to EternalBlue.
Which of the following would BEST protect against this vulnerability?
Which of the following would BEST protect against this vulnerability?
PT0-002 Exam Question 3
A penetration tester was able to compromise a web server and move laterally into a Linux web server. The tester now wants to determine the identity of the last user who signed in to the web server. Which of the following log files will show this activity?
PT0-002 Exam Question 4
In the process of active service enumeration, a penetration tester identifies an SMTP daemon running on one of the target company's servers. Which of the following actions would BEST enable the tester to perform phishing in a later stage of the assessment?
PT0-002 Exam Question 5
Which of the following documents must be signed between the penetration tester and the client to govern how any provided information is managed before, during, and after the engagement?