exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 220 discussion

Actual exam question from CompTIA's PT0-002
Question #: 220
Topic #: 1
[All PT0-002 Questions]

A penetration tester will be performing a vulnerability scan as part of the penetration test on a client's website. The tester plans to run several Nmap scripts that probe for vulnerabilities while avoiding detection. Which of the following Nmap options will the penetration tester MOST likely utilize?

  • A. -а8 -T0
  • B. --script "http*vuln*"
  • C. -sn
  • D. -O -A
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Etc_Shadow28000
9 months, 3 weeks ago
Selected Answer: B
B. –script “httpvuln”: • The --script option allows the tester to specify a selection of Nmap scripts to run. The pattern "http*vuln*" selects scripts that probe for HTTP vulnerabilities. This option directly targets vulnerability scanning, making it the most relevant for the task described.
upvoted 1 times
Etc_Shadow28000
9 months, 3 weeks ago
A. -а8 -T0: • The -а8 option is not a valid Nmap option. However, if you meant -A, it would enable OS detection, version detection, script scanning, and traceroute. -T0 sets the timing template to the slowest possible, which helps avoid detection but is not specifically for selecting vulnerability scripts. C. -sn: • The -sn option is used for a “ping scan” to determine which hosts are up without performing port scanning. This is not suitable for probing vulnerabilities. D. -O -A: • The -O option enables OS detection, and -A enables OS detection, version detection, script scanning, and traceroute. While -A includes script scanning, it is not focused solely on vulnerability scanning scripts and may perform additional actions that could increase the risk of detection.
upvoted 1 times
...
...
pepgua
10 months, 3 weeks ago
The MOST correct answer for the penetration tester's vulnerability scan with stealth in mind is B. --script "httpvuln"` Here's a breakdown of why this option is the most suitable: **--script "httpvuln": This command leverages the Nmap Scripting Engine (NSE) to run scripts that specifically target potential HTTP vulnerabilities. The pattern"httpvuln"` instructs Nmap to execute all scripts whose names begin with "http" and contain "vuln" (likely vulnerability-related scripts). By focusing on HTTP vulnerabilities relevant to the website, this approach minimizes unnecessary checks and reduces the scan's overall footprint. By employing the --script "http*vuln*" option, the penetration tester can conduct a targeted vulnerability scan that prioritizes stealth while focusing on potential HTTP vulnerabilities relevant to the client's website.
upvoted 1 times
...
Natthew99
1 year, 6 months ago
MOST likely -sn (no port scan). Using http*vuln* will all run 27 scripts, 13 of which are categorized intrusive, another 11 are categorized exploit. It's http, so any security monitoring is going to catch injection and exploit related nmap scripts
upvoted 1 times
...
solutionz
1 year, 8 months ago
Selected Answer: B
In the context of performing a vulnerability scan with Nmap, particularly for probing for web vulnerabilities, option B would be the most appropriate choice. The other options don't directly relate to probing for web vulnerabilities or avoiding detection in the context provided:
upvoted 1 times
...
[Removed]
2 years ago
Selected Answer: B
The penetration tester will most likely utilize option B, "--script "httpvuln"", to run several Nmap scripts that probe for vulnerabilities while avoiding detection. Explanation: Option A, "-а8 -T0", sets the timing template to paranoid and sends packets with minimum delay, which may slow down the network or cause the scan to fail if the target is rate-limited or IDS/IPS is triggered. Option B, "--script "httpvuln"", allows the tester to run Nmap scripts that probe for vulnerabilities specific to the HTTP protocol. This is a targeted approach to scanning for vulnerabilities and helps to avoid detection by using only the relevant scripts. Option C, "-sn", is used for a ping scan to determine which hosts are up on a network. This option is not relevant for vulnerability scanning. Option D, "-O -A", performs operating system and service version detection, which may be useful for reconnaissance purposes, but not for vulnerability scanning.
upvoted 1 times
...
nickwen007
2 years, 1 month ago
The answer is B. The option --script "http*vuln*" allows the tester to run Nmap scripts that identify vulnerabilities while avoiding detection. O -A is an option for Nmap that enables operating system and application detection. This option is not recommended for a penetration tester, as it could be detected by the target system.
upvoted 2 times
...
Codyjs54
2 years, 2 months ago
Selected Answer: B
Uhh.. -a8 isn't a nmap switch. The question is also clearly stating "script". It can only be B.
upvoted 4 times
...
ronniehaang
2 years, 3 months ago
Selected Answer: B
-a8 is incorrect.
upvoted 2 times
...
masso435
2 years, 4 months ago
Selected Answer: B
It says they want to run script and it indicates it's for HTTP
upvoted 2 times
...
Treebeard88
2 years, 4 months ago
Selected Answer: A
The -A flag is for aggressive scans. If you’re trying to avoid detection you would not want to use this. The -O is useful for host detection but the ‘low and slow’ T0 will also perform this action if I’m not mistaken.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago