All Posts

Comptia Pentest+ 2023 Questions and answer - Part 8

Mary Mary Smith
03 Mar 2023
3 min
0

1. Which one of the following is a unique set of technologies, services, and rights to help you deploy, manage, and use your Microsoft products more effectively?

A) Software Assurance
B) Forensics
C) Persistence
D) Configuration Compliance



2. An hping command is used to send traffic to a remote system as Hping remotesite.com -S -V -p 80, what will be the traffic seen by a remote system?

A) A TCP three-way handshake to TCP port 80
B) TCP SYNs to TCP port 80
C) HTTP traffic to TCP port 80
D) HTTPS traffic to TCP port 80



3. A system was accessed by a user to gather more information about other hosts in its local subnet. The user intends to perform a port scan but is not able to install other tools to do so. Which one of the tools given is not usable as a port scanner?

A) Netcat
B) Hping
C) ExifTool
D) Telnet



4. Against a hashed password file User wants to run John the Ripper. To successfully crack the file, what information does she need to know?

A) The number of passwords
B) The hash used
C) A sample word list
D) None of the above



5. A list of valid user accounts has been acquired by Lauren but she does not have passwords for them. Not having found any vulnerabilities, the targeting organization is believed to have a poor password practice. What could be the type of attack she uses in order to gain access to a target system where those usernames are likely valid?

A) Thesaurus Attacks
B) Rainbow Tables
C) Meterpreter
D) Dictionary Attacks



1. Right Answer: A
Explanation: Software assurance is a unique set of technologies, services, and rights to help you deploy, manage, and use your Microsoft products more effectively.

2. Right Answer: B
Explanation: A command is issued that asks hping to send SYN traffic (-S) to remotesite.com in verbose mode(-V) on port 80.

3. Right Answer: C
Explanation: Except ExifTool, All of these tools are usable as port scanners with some smart usage: Telnet: Telnet is a user command and an underlying TCP/IP protocol for accessing remote computers. . Netcat : nc -zv example.com 1-2014 Hping: hping example.com -V --scan 1-1024

4. Right Answer: D
Explanation: John the Ripper includes the automatic hash type detection. Angela feeds the hashed password file. Since John the Ripper can recognize the hashed format, it will attempt to crack the passwords.

5. Right Answer: D
Explanation: A brute-force dictionary attack is used for weak passwords. A custom dictionary for her target organization is built and some social engineering work or social media assessment up front to help her identify any common password selection behaviors may be done that the members of the organization tend to display.

0 Comments
Leave a comment