exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 18 discussion

Actual exam question from CompTIA's PT0-002
Question #: 18
Topic #: 1
[All PT0-002 Questions]

An Nmap scan shows open ports on web servers and databases. A penetration tester decides to run WPScan and SQLmap to identify vulnerabilities and additional information about those systems.
Which of the following is the penetration tester trying to accomplish?

  • A. Uncover potential criminal activity based on the evidence gathered.
  • B. Identify all the vulnerabilities in the environment.
  • C. Limit invasiveness based on scope.
  • D. Maintain confidentiality of the findings.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
masso435
Highly Voted 2 years, 5 months ago
Selected Answer: C
I think the wording is tricky. Yes both applications scan for vulnerabilities but not all vulnerabilities. This indicates it will find vulnerability outside of WordPress and SQL based on the wording alone.
upvoted 11 times
yeahnodontthinkso
4 days, 19 hours ago
So then your answer is B not C. The tester found open ports in the web server and DB, so they're further enumerating those services based on that. They're not purposefully limiting the scope, that's just the leads they got which they are following to try to find vulnerabilities. The answer is B.
upvoted 1 times
...
shakevia463
2 years, 2 months ago
Doesnt mean hes not attempting to find all vulnerabilites.... he is trying to find them.
upvoted 5 times
...
...
dcyberguy
Highly Voted 2 years, 5 months ago
Selected Answer: B
Identifying Vulnerabilities should be the clear choice
upvoted 9 times
...
BlackSkullz
Most Recent 5 months, 2 weeks ago
Selected Answer: B
I can see both B & C being correct but I give the edge to B. While it is entirely possible he's limiting invasiveness based on the scope by just using tools tailored to the web server and database, the scope is never mentioned and there's no way we could possibly know the parameters of that scope. What we do know is that he's using SQLmap and WPScan, which would identify all the vulnerabilities in the enviornment mentioned above (Web server and database)
upvoted 2 times
...
cy_analyst
7 months, 1 week ago
Selected Answer: B
The penetration tester is using WPScan and SQLmap to identify vulnerabilities and gather additional information about the web servers and databases. WPScan is a tool used specifically for scanning WordPress installations for vulnerabilities, while SQLmap is a tool for identifying SQL injection vulnerabilities in web applications. By running these tools against the open ports discovered by Nmap, the penetration tester can gather more information about the systems and potentially identify vulnerabilities that can be exploited.
upvoted 5 times
...
solutionz
7 months, 1 week ago
Selected Answer: B
WPScan and SQLmap are tools used for scanning WordPress sites and SQL databases for vulnerabilities, respectively. By running these tools, a penetration tester is actively looking for vulnerabilities in web servers (with WPScan) and databases (with SQLmap). The intention behind this action aligns with the option to identify weaknesses and vulnerabilities within those specific systems, rather than a broader or more general assessment of the environment. Therefore, the correct answer to this question is: B. Identify all the vulnerabilities in the environment.
upvoted 1 times
...
Etc_Shadow28000
7 months, 1 week ago
Selected Answer: B
The penetration tester is trying to: B. Identify all the vulnerabilities in the environment. configurations that could be exploited for criminal activity, the primary goal of using WPScan and SQLmap is to find and identify vulnerabilities, not necessarily to uncover criminal activity. C. Limit invasiveness based on scope: • Running vulnerability scanning tools like WPScan and SQLmap might be part of the scope, but these tools can be invasive. The intent behind using these tools is to discover vulnerabilities, not necessarily to limit invasiveness.
upvoted 1 times
...
pizzaThyme
7 months, 1 week ago
Selected Answer: B
I leaned toward B when I first read this but MAN I hate the way they word stuff like this. I hope I don't see this during my exam. Never have I seen so many professionals polarized on some of these questions before as I have with PT0-02.
upvoted 1 times
...
MeisAdriano
7 months, 1 week ago
Selected Answer: B
WPScan is used for wordpress vulnerability SQLmap is used to find sql injection vulnerability. If the pentester already found opened doors with nmap, WPScan and SQLmap is just to complete ALL potential vulnerabilities not C because WPScan and SQLmap are not specified to limit invasiveness, the just find vulnerability in a specific purpose
upvoted 1 times
...
djash22
9 months, 3 weeks ago
However, considering the specificity of the tools (WPScan for WordPress vulnerabilities and SQLmap for SQL injection vulnerabilities), it would be more accurate to say the tester aims to identify specific vulnerabilities in the web servers and databases, but within the broader context, identifying vulnerabilities aligns with option B the closest.
upvoted 1 times
...
BirdLawyer
11 months, 1 week ago
Selected Answer: C
I originally thought it was B but it seems to be that they included the nmap scan showing the specific port categories that were open as well as the word scope in the answer C. My logic is that the tester identified the scope using nmap and once he did that he then is limiting the testing to those specific ports in question thereby limiting the invasiveness of the testing overall and adhering to the scope.
upvoted 2 times
...
Bluedegard
1 year ago
Selected Answer: B
I don't think using WPscan and SQLmap will reduce invasiveness
upvoted 1 times
...
NickyCEE
1 year, 1 month ago
Selected Answer: B
The answer is definitely B yall. The pentester scanned the WHOLE system and only found open WEB and DATABASE ports. Now the tester is using specific tools to exploit those services. Had the tester found other open services they would use more tools. So they arent limiting invasiveness they are exploiting everything that is POSSIBLE.
upvoted 1 times
...
deeden
1 year, 1 month ago
Selected Answer: C
Agree with C. Trying to identify all vulnerabilities would probably include DoS and Buffer Overflows which can be invasive and will probably need scanner other than WPScan and SQLmap
upvoted 1 times
...
Yokota
1 year, 3 months ago
Selected Answer: C
The penetration tester uses these tools to find vulnerabilities within the defined scope, which might cover WordPress and SQL vulnerabilities, while making sure not to exceed the permitted testing boundaries
upvoted 3 times
...
me39
1 year, 4 months ago
The correct answer is B. "C. Limit invasiveness based on scope" adds new information that is not contained in the question. Would you choose C if it said, "C. Limit invasiveness to reduce interference with end of year reports"?
upvoted 2 times
...
KeToopStudy
1 year, 4 months ago
Selected Answer: B
So considdering the fact that the nmap showed open ports only on web server and databases we can safely assume that there are no other ports open. So the use of WPScan and SQL injection leads me to belive that the pentester is going for discovery of all vulnerabilities. B should be the right answer
upvoted 1 times
...
Skater_Grace
1 year, 6 months ago
Selected Answer: B
I think its B, as tester wants to reveal more vulnerabilities . Invasion will come after exploitation..
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago