exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 141 discussion

Actual exam question from CompTIA's PT0-002
Question #: 141
Topic #: 1
[All PT0-002 Questions]

A Chief Information Security Officer wants to evaluate the security of the company's e-commerce application. Which of the following tools should a penetration tester use FIRST to obtain relevant information from the application without triggering alarms?

  • A. SQLmap
  • B. DirBuster
  • C. w3af
  • D. OWASP ZAP
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
NotAHackerJustYet
Highly Voted 1 year, 8 months ago
Selected Answer: D
The correct answer is D. OWASP ZAP. OWASP ZAP (Open Web Application Security Project Zed Attack Proxy) is a free and open source web application security scanner designed to help security professionals identify security vulnerabilities in web applications. It can be used to identify potential weaknesses and vulnerabilities, such as SQL injection, cross-site scripting, and other security issues. It also provides a way for penetration testers to obtain information about the application without triggering alarms or other security measures.
upvoted 5 times
NotAHackerJustYet
1 year, 8 months ago
A. SQLmap is an open source tool used for detecting and exploiting SQL injection vulnerabilities. While it can be used to help identify security flaws in a web application, it is not the best tool for the task. B. DirBuster is a web application brute force tool used to discover hidden files and directories on a web server. It is not the best tool for evaluating the security of an e-commerce application, as it does not provide relevant information about the application itself. C. w3af is an open source web application security scanner designed to identify and exploit web application vulnerabilities. While it can be used to identify potential security issues, it is not the best tool for the task.
upvoted 3 times
...
...
broman
Most Recent 2 months, 1 week ago
Selected Answer: B
It is less intrusive compared to automated vulnerability scanners like SQLmap or w3af. It identifies attack surfaces before performing actual exploitation. It can be configured to limit requests per second to avoid triggering security alarms
upvoted 1 times
...
deeden
7 months, 1 week ago
Selected Answer: B
DirBuster: DirBuster is a directory traversal and file enumeration tool commonly used for discovering hidden directories and files on web servers. It performs dictionary-based brute force attacks against web servers, attempting to enumerate directories and files that are not explicitly linked from the application's visible interface. DirBuster's approach is non-intrusive, as it relies on directory and file enumeration rather than actively probing or interacting with the application's functionalities. By discovering hidden directories and files, the penetration tester can gather valuable information about the application's structure and potentially identify overlooked entry points or vulnerabilities.
upvoted 1 times
...
[Removed]
1 year, 6 months ago
The tool that should be used FIRST to obtain relevant information from an e-commerce application without triggering alarms is OWASP ZAP (Zed Attack Proxy). It is designed specifically for web application security testing and can help identify vulnerabilities such as SQL injection and cross-site scripting (XSS) attacks. It also has a "spider" feature that can automatically navigate the application and discover hidden pages and functionality.
upvoted 1 times
...
nickwen007
1 year, 7 months ago
The best tool for a penetration tester to use first to obtain relevant information from the application without triggering alarms is OWASP ZAP. This open-source tool is designed to detect security vulnerabilities, such as SQL injection and cross-site scripting, in web applications. SQLmap, DirBuster, and w3af are all useful tools, but are not meant to be used for passive reconnaissance.
upvoted 3 times
...
kenechi
1 year, 7 months ago
Selected Answer: D
D - OWASP ZAP has two modes of scanning. Active and Passive. By default it passively scans all HTTP messages (requests and responses) sent to the web application being tested without triggering any alarms. https://www.zaproxy.org/docs/desktop/start/features/pscan/
upvoted 4 times
...
cy_analyst
1 year, 7 months ago
Selected Answer: B
To obtain relevant information from the application without triggering alarms, the penetration tester should use a reconnaissance tool. Among the given options, DirBuster is a reconnaissance tool used to discover directories and files hidden on a web server. Therefore, the correct answer is B. DirBuster. SQLmap is used to test SQL injection vulnerabilities in a web application, w3af is a web application security scanner, and OWASP ZAP is a web application security scanner and vulnerability assessment tool. These tools may trigger alarms and should be used after a proper reconnaissance phase.
upvoted 1 times
cy_analyst
1 year, 7 months ago
yep this is wrong
upvoted 5 times
...
[Removed]
1 year, 7 months ago
Wrong D is the answer OWASP ZAP 100% for sure
upvoted 3 times
...
...
2Fish
1 year, 8 months ago
D. For sure.
upvoted 3 times
...
[Removed]
1 year, 9 months ago
Selected Answer: D
D. https://owasp.org/Top10/A09_2021-Security_Logging_and_Monitoring_Failures/
upvoted 3 times
...
Random_Mane
1 year, 10 months ago
Selected Answer: C
W3AF, the Web Application Attack and Audit Framework, is an open source web application security scanner that includes directory and filename brute‐forcing in its list of capabilities.
upvoted 1 times
RRabbit_111
1 year, 9 months ago
OWASP ZAP is a passive web application scanner that allows a penetration tester to obtain relevant information from the application without triggering alarms, while W3AF is an active web application scanner that automates the process of detecting and exploiting vulnerabilities in web applications. It is important to start with passive reconnaissance to obtain information about the application and its structure, vulnerabilities, and potential attack vectors, before moving on to active testing and exploitation. OWASP ZAP is a good tool to start with as it is a passive scanner and it can be used to obtain relevant information from the application without triggering alarms.
upvoted 3 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago