CompTIA PenTest+ PT0-002 Practice Question

A penetration tester has been tasked with gathering information about a target company without directly interacting with the company's systems. Which of the following methods would be most effective and appropriate for the tester to utilize to obtain potential user names, technology stacks, and job roles within the company?

  • Using Shodan to scan for vulnerable company assets and extract employee information

  • Reviewing the company's open-source code contributions for potential user names and job roles

  • Performing DNS lookups to identify potential usernames and job roles

  • Social media scraping to review profiles and posts for key employee information

CompTIA PenTest+ PT0-002
Information Gathering and Vulnerability Scanning
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot