exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 145 discussion

Actual exam question from CompTIA's PT0-002
Question #: 145
Topic #: 1
[All PT0-002 Questions]

During a penetration-testing engagement, a consultant performs reconnaissance of a client to identify potential targets for a phishing campaign. Which of the following would allow the consultant to retrieve email addresses for technical and billing contacts quickly, without triggering any of the client's cybersecurity tools?
(Choose two.)

  • A. Scraping social media sites
  • B. Using the WHOIS lookup tool
  • C. Crawling the client's website
  • D. Phishing company employees
  • E. Utilizing DNS lookup tools
  • F. Conducting wardriving near the client facility
Show Suggested Answer Hide Answer
Suggested Answer: AB 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Neolot
Highly Voted 2 years, 7 months ago
Selected Answer: BC
B and C is correct. B allows you to get the technical contacts using WHOIS. C allows you to get to billing/sales contacts
upvoted 19 times
...
ryanzou
Highly Voted 2 years, 7 months ago
Selected Answer: AC
A C is correct
upvoted 6 times
...
StillFiguringItOut
Most Recent 8 months, 3 weeks ago
Selected Answer: AB
A/B. These are the only answers that would not trigger an alert
upvoted 3 times
...
Marty35
11 months, 2 weeks ago
A and B are MOST correct. C is usefull, too, but more sus. Could get detected doing that.
upvoted 1 times
...
Hedwig74
1 year, 1 month ago
Both scraping and crawling can trigger cyber tools because they are essentially bots, but I believe that they are looking for the answers B and C because the information can be received easily and quickly (though I think "crawling" in answer C should be replaced with "browsing").
upvoted 1 times
...
yeti87
1 year, 2 months ago
Selected Answer: BC
Its trying to trick into "A" scraping social media. While this will be passive reconnaissance and could be correct, the question asks for getting the email addresses. Usually you can't get the email addresses from the users on social media platforms. Getting email addresses is easiest as described by Neolot: With a whois you can most likely get a technical contact email address. Additionally on the company website you usually can find contact addresses of sales as well as on a lot of company sites also technical contact. It would also not necessarily trigger an alarm, if you don't crawl all pages. Don't even need a automatic crawler for this, just navigate to to pages such as "contact"...
upvoted 1 times
...
Sleezyglizzy
1 year, 2 months ago
Selected Answer: AC
Look on the older dump by exam topic it is AC
upvoted 2 times
...
Big_Dre
1 year, 2 months ago
Selected Answer: AC
these are the only 2 options that will not be considered active reconnaissance
upvoted 1 times
...
Yokota
1 year, 3 months ago
Selected Answer: AB
A and B, C will trigger CAPTCHAs and Log Analysis
upvoted 2 times
...
LiveLaughToasterBath
1 year, 3 months ago
Selected Answer: AB
Crawling can trigger an alert. Scraping data from social media can result in email format/useful emails Whois shouldn't trigger an alert (as you're querying a db that stores registered IP addy info and not the IP addy of the company itself) and can be used with 3rd party apps/websites, like http://viewdns.info
upvoted 2 times
...
mehewas855
1 year, 5 months ago
Selected Answer: AB
In pentesting, this would be active information gathering. You are ac-tively engaging the target in order to do things like detect open ports, webpages, services, and identify exploitable weaknesses you can use duringthe pentest. These actions may show up in logs, monitoring systems, or af-fect bandwidth utilization of the target. Which means that C is considered Active reconnaissance. According to study text, C may in some scenarios trigger monitoring tools. ANY of the client's cybersecurity tools
upvoted 1 times
...
DRVision
1 year, 5 months ago
Selected Answer: AB
keywords " without triggering any alarms" A & B are both passive reconnaissance which means no interaction with any systems
upvoted 2 times
...
UseChatGPT
1 year, 7 months ago
Selected Answer: AB
AB only ones that can't be detected. Cmon guys
upvoted 3 times
rsjacks
1 year, 1 month ago
But how will social media sites provide company email addresses?
upvoted 2 times
rsjacks
1 year, 1 month ago
and billing contacts?
upvoted 2 times
...
...
...
solutionz
1 year, 9 months ago
Selected Answer: BC
These methods are passive, meaning they don't involve direct interaction with the target that might raise suspicions or trigger alerts, making them suitable choices for the given scenario. The other options, such as scraping social media sites (A), phishing company employees (D), utilizing DNS lookup tools (E), or conducting wardriving near the client facility (F), may not specifically target the retrieval of technical and billing contacts' email addresses or may involve more intrusive or active methods that could potentially be detected.
upvoted 1 times
MartinRB
1 year, 5 months ago
how can be scraping social media sites and utilizing DNS lookup tools detected?
upvoted 1 times
...
...
bieecop
1 year, 9 months ago
Selected Answer: BC
B. Using the WHOIS lookup tool: The WHOIS lookup tool provides information about domain names, including the contact details associated with the domain. By performing a WHOIS lookup on the client's domain, the consultant can retrieve email addresses for technical and billing contacts without directly interacting with the client's infrastructure. C. Crawling the client's website: By crawling the client's website, the consultant can extract email addresses from publicly available web pages. This can include contact pages, team member profiles, or other sections of the website that may display email addresses for technical and billing contacts.
upvoted 1 times
...
nooooo
1 year, 10 months ago
Selected Answer: AB
Going with A and B. Web Crawlers can be detected.
upvoted 3 times
...
lifehacker0777
2 years, 1 month ago
Selected Answer: AB
Duplicate of https://www.examtopics.com/exams/comptia/pt1-002/view/28/ Some examples of security measures on a website that could potentially trigger cybersecurity tools during crawling or scanning activities include: Web Application Firewall (WAF): A WAF is designed to detect and block malicious web traffic, including activities that may be considered suspicious, such as repeated or aggressive crawling or scanning of the website. Intrusion Detection System/Intrusion Prevention System (IDS/IPS): An IDS/IPS is designed to detect and prevent unauthorized access or malicious activities on a network or website. It may be configured to detect patterns of crawling or scanning activities and trigger alerts or block access. Rate limiting or throttling: The website may have rate limiting or throttling mechanisms in place to limit the number of requests or connections from a single IP address or user agent within a certain time frame. Exceeding these limits may trigger alerts or blocks. Captchas or challenge-response mechanisms: Custom security scripts or tools:
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago