Home β€Ί Blog β€Ί CompTIA

Comptia Pentest+ 2023 Questions and answer - Part 17

Mary Mary Smith
03 Mar 2023
2 min read
0 views
0 Comments
2 min read
362 words

1. Which of the following is a process of scanning and monitoring the captured data packets passing through a network?

A) Packet Crafting
B) Packet Inspection
C) Sniffing
D) Enumeration



2. Which of the following procedures is used when software binaries need to be converted into clear text format in a high-level language?

A) Decompilation
B) Debugging
C) Eavesdropping
D) None of the above



3. Select the automated utilities that are specially developed to detect vulnerabilities, weaknesses, problems, and loopholes in an operating system, network, software, and application.

A) Vulnerability Scanner
B) Vulnerability Mapping
C) Application Scan
D) None of the above



4. Which one of the following types of scan ensures that the targeted host is alive and the connection is complete?

A) Stealth Scan
B) Full Scan
C) Half Scan
D) Discovery Scan



5. Select the type of scan that identifies the operating systems running on a network, maps those systems to IP addresses, and enumerates the open ports and services on those systems?

A) Full Scan
B) Half Scan
C) Stealth Scan
D) Discovery Scan



1. Right Answer: C
Explanation: Sniffing is a process of scanning and monitoring the captured data packets passing through a network.

2. Right Answer: A
Explanation: Decompilation is a process when software binaries convert into clear text format in a high-level language in which the source code is written so that creators can read it.

3. Right Answer: A
Explanation: Vulnerability scanners are automated utilities that are specially developed to detect vulnerabilities, weaknesses, problems, and loopholes in an operating system, network, software, and application.

4. Right Answer: B
Explanation: Full Open Scanning ensures the response that the targeted host is live and the connection is complete.

5. Right Answer: D
Explanation: A Discovery Scan identifies the operating systems that are running on a network, maps those systems to IP addresses, and enumerates the open ports and services on those systems.

Mary
Written by
Comments
0