exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 53 discussion

Actual exam question from CompTIA's PT0-002
Question #: 53
Topic #: 1
[All PT0-002 Questions]

A penetration tester is preparing to perform activities for a client that requires minimal disruption to company operations.
Which of the following are considered passive reconnaissance tools? (Choose two.)

  • A. Wireshark
  • B. Nessus
  • C. Retina
  • D. Burp Suite
  • E. Shodan
  • F. Nikto
Show Suggested Answer Hide Answer
Suggested Answer: AE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Mr_BuCk3th34D
Highly Voted 1 year ago
Selected Answer: AE
A. Wireshark passive monitoring tool is Wireshark. Wireshark technically is referred to as a “protocol analyzer”, but it uses only passive observation of network traffic. B. Nessus, a proprietary vulnerability scanner developed by Tenable, can be noisy. C. Retina D. Burp Suite , can be used as a proxy, that will be on-path. E. Shodan , in this online tool, called the Google for IoT devices, you have access to scan results, so there's no active interaction between the client and the server/endpoint F. Nikto , like Nessus, an Open Source software written in Perl language that is used to scan a web-server for the vulnerability
upvoted 6 times
...
RRabbit_111
Highly Voted 11 months, 2 weeks ago
Selected Answer: AE
A. Wireshark: Wireshark is a network protocol analyzer tool that allows you to capture and analyze network traffic in real-time. It can be used to troubleshoot network issues, identify network performance bottlenecks, and detect security threats. It is considered a passive reconnaissance tool because it only captures and analyzes network traffic without actively trying to exploit vulnerabilities. E. Shodan: Shodan is a search engine that specializes in finding Internet-connected devices. It can be used to discover servers, routers, cameras, and other devices that are connected to the Internet. It is considered a passive reconnaissance tool because it only searches for information that is publicly available on the Internet, without actively trying to exploit vulnerabilities.
upvoted 6 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...