exam questions

Exam PT1-002 All Questions

View all questions & answers for the PT1-002 exam

Exam PT1-002 topic 1 question 109 discussion

Actual exam question from CompTIA's PT1-002
Question #: 109
Topic #: 1
[All PT1-002 Questions]

During a penetration-testing engagement, a consultant performs reconnaissance of a client to identify potential targets for a phishing campaign. Which of the following would allow the consultant to retrieve email addresses for technical and billing contacts quickly, without triggering any of the client's cybersecurity tools?
(Choose two.)

  • A. Scraping social media sites
  • B. Using the WHOIS lookup tool
  • C. Crawling the client's website
  • D. Phishing company employees
  • E. Utilizing DNS lookup tools
  • F. Conducting wardriving near the client facility
Show Suggested Answer Hide Answer
Suggested Answer: AC 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
EZ1656
Highly Voted 3 years, 3 months ago
Selected Answer: AC
I will go A and C here
upvoted 7 times
...
BinarySoldier
Highly Voted 3 years, 5 months ago
This should be A and C. Technical and billing addresses are usually posted on company websites and company social media sites for the their clients to access. The WHOIS lookup will only avail info for the company registrant, an abuse email contact, etc but it may not contain details for billing addresses.
upvoted 6 times
Davar39
3 years, 4 months ago
You are correct, in addition, WHOIS lookup is considered an active recon tool so it might trigger alerts.
upvoted 3 times
Gargomel
2 years, 6 months ago
No it won't. You can do a WhoIs Lookup on Domain Tools and it definitely has the technical contacts on there and not just the registrant
upvoted 1 times
...
[Removed]
2 years, 5 months ago
Whois, is not an active reconnaissance tool. It’s passive. The information you gather using whois, is public knowledge that anyone can see or get. https://www.linkedin.com/pulse/passive-reconnaissance-tools-nitin-bhanderi
upvoted 1 times
...
...
...
CCSXorabove
Most Recent 10 months, 1 week ago
Selected Answer: AB
A because to identify potential targets for a phishing campaign B because any who is have the technical and billing contacts
upvoted 1 times
...
lifehacker0777
2 years, 1 month ago
Selected Answer: AB
Duplicate of https://www.examtopics.com/exams/comptia/pt0-002/view/29/ Some examples of security measures on a website that could potentially trigger cybersecurity tools during crawling or scanning activities include: Web Application Firewall (WAF): A WAF is designed to detect and block malicious web traffic, including activities that may be considered suspicious, such as repeated or aggressive crawling or scanning of the website. Intrusion Detection System/Intrusion Prevention System (IDS/IPS): An IDS/IPS is designed to detect and prevent unauthorized access or malicious activities on a network or website. It may be configured to detect patterns of crawling or scanning activities and trigger alerts or block access. Rate limiting or throttling: The website may have rate limiting or throttling mechanisms in place to limit the number of requests or connections from a single IP address or user agent within a certain time frame. Exceeding these limits may trigger alerts or blocks. Captchas or challenge-response mechanisms: Custom security scripts or tools:
upvoted 1 times
...
Anarckii
2 years, 4 months ago
Selected Answer: AC
I believe others are overthinking this. Simplify the question with the answers. If you don't want to alert any of the detection tools, don't use any tools at all. A and C
upvoted 4 times
...
Nithish_s
3 years, 7 months ago
I think it’s B and C
upvoted 2 times
Isuzu
3 years, 7 months ago
you right it's B and C
upvoted 1 times
...
...
Isuzu
3 years, 8 months ago
I think Correct Answer is A, C. WHOIS lookup can't be correct because the question state ...without triggering any cybersecurity tools.
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...