Chapter Quiz: CompTIA PenTest+ (PT0-001): 3 Select Your Attacks (Michael Solomon LinkedIN Flashcards
Which attack has the main goal of convincing an authorized user to carry out some action that you, as the attacker, cannot accomplish with just limited access?
A.man-in-the-middle
B.social engineering
C.phishing
D.masquerading
B.social engineering
The command within Kali to install sendmail is _____.
A.install sendmail
B.apt- install sendmail
C. get install sendmail
D.apt-get install sendmail
D.apt-get install sendmail
Network exploits that attack mail flowing in and out of a particular device are targeting which protocol?
A.Telnet
B.SMTP
C.FTP
D.SNMP
B.SMTP
The Metasploit command to use the vsftpd 234 backdoor exploit is _____.
A.msf exploit(ms08_067_netapi) > exploit -j
B.use exploits/unix/ftp/vsftpd_234_backdoor
C.run msf exploit(ms08_067_netapi) > exploit D.execute exploits /unix/ftp/vsftpd_234_backdoor
B.use exploits/unix/ftp/vsftpd_234_backdoor
DNS cache poisoning is an example of what type of attack?
A.SQL Injection
B.tear-drop
C.Wireless exploit
D.man-in-the-middle
D.man-in-the-middle
A(n) _____ is a rogue access point that is typically going to use the same SSID as a valid SSID or a valid WAP, and you are going to get your clients or your victims to connect to it.
A.snarf
B.ssid
C.fakessid
D.evil twin
D.evil twin
Which command in SQL means you’re going to add another command and you’re going to produce the output as the combination of the two outputs?
A.union
B.merge
C.combine
D.join
A.union
This application exploit is designed to send a user to a different site from what they were expecting.
A.credential harvesting
B.session hijacking
C.phishing
D.redirecting
D.redirecting
How should a pen tester think?
A.like a manager
B.like a tester
C.like an attacker
D.like a developer
C.like an attacker
Which of the following is not a stage of the kill chain?
A.Reconnaissance
B.Weaponisation
C.Exploitation
D.Revalidation
D.Revalidation
We can use DOS commands in Powershell.
A.TRUE
B.FALSE
A.TRUE
The expression nc 10.0.2.8 4545 will listen for connections
A.TRUE
B.FALSE
B.FALSE
Which switch or switches are used to identify the operating system?
A.sn
B.sU
C.PS
D.O
D.O
What switch is used to save tcpdump output as a pcap file?
A.ip4
B.w
C.p
D.c
B.w
What does the -es switch do when used with netstat?
A.shows the process id associated with connections
B.show tcp ports
C.list all active servers
D.shows the number of active and passive ports
D.shows the number of active and passive ports
What Nishang command do we use if we want to create a maliciously modified excel spreadsheet?
A.Out-Excel
B.Bypass-Doc
C.Inject-X
D.Brute-Excel
D.Brute-Excel
We must always use a RETURN command to exit a function in Bash.
A.TRUE
B.FALSE
B.FALSE
What expression do we use to access the second command line argument in Bash?
A.$1
B.$2
C.arg2
D.arg1
$2
Scapy allows us to spoof the source address and port in a packet.
A.TRUE
B.FALSE
A.TRUE
We have to declare variable types in Python before we use them.
A.TRUE
B.FALSE
B.FALSE