Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

CompTIA PT1-002 Exam Actual Questions

The questions for PT1-002 were last updated at Aug. 8, 2022.
  • Viewing page 1 out of 28 pages.
  • Viewing questions 1-4 out of 115 questions

Topic 1 - Single Topic

Question #1 Topic 1

A client wants a security assessment company to perform a penetration test against its hot site. The purpose of the test is to determine the effectiveness of the defenses that protect against disruptions to business continuity. Which of the following is the MOST important action to take before starting this type of assessment?

  • A. Ensure the client has signed the SOW.
  • B. Verify the client has granted network access to the hot site.
  • C. Determine if the failover environment relies on resources not owned by the client.
  • D. Establish communication and escalation procedures with the client.
Reveal Solution Hide Solution   Discussion   12

Correct Answer: C 🗳️

Question #2 Topic 1

Performing a penetration test against an environment with SCADA devices brings additional safety risk because the:

  • A. devices produce more heat and consume more power.
  • B. devices are obsolete and are no longer available for replacement.
  • C. protocols are more difficult to understand.
  • D. devices may cause physical world effects.
Reveal Solution Hide Solution   Discussion   7

Correct Answer: C 🗳️

Question #3 Topic 1

Which of the following documents describes specific activities, deliverables, and schedules for a penetration tester?

  • A. NDA
  • B. MSA
  • C. SOW
  • D. MOU
Reveal Solution Hide Solution   Discussion   6

Correct Answer: C 🗳️

Question #4 Topic 1

A company hired a penetration-testing team to review the cyber-physical systems in a manufacturing plant. The team immediately discovered the supervisory systems and PLCs are both connected to the company intranet. Which of the following assumptions, if made by the penetration-testing team, is MOST likely to be valid?

  • A. PLCs will not act upon commands injected over the network.
  • B. Supervisors and controllers are on a separate virtual network by default.
  • C. Controllers will not validate the origin of commands.
  • D. Supervisory systems will detect a malicious injection of code/commands.
Reveal Solution Hide Solution   Discussion   5

Correct Answer: C 🗳️

Community vote distribution
A (35%)
C (25%)
B (20%)
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

Loading ...