CompTIACompTIA
PT0-002 · Question #163
PT0-002 Question #163: Real Exam Question with Answer & Explanation
Sign in or unlock PT0-002 to reveal the answer and full explanation for question #163. The question stem and answer options stay visible for context.
Information Gathering and Vulnerability Scanning
Question
A penetration tester downloaded a Java application file from a compromised web server and identifies how to invoke it by looking at the following log: Which of the following is the order of steps the penetration tester needs to follow to validate whether the Java application uses encryption over sockets?
Options
- ARun an application vulnerability scan and then identify the TCP ports used by the application.
- BRun the application attached to a debugger and then review the application's log.
- CDisassemble the binary code and then identify the break points.
- DStart a packet capture with Wireshark and then run the application.
Unlock PT0-002 to see the answer
You've previewed enough free PT0-002 questions. Unlock PT0-002 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.
Topics
#Packet capture#Network analysis#Encryption validation#Dynamic analysis