CompTIA PenTest+ Certification Practice Exams (Jonathan Ammerman) Flashcards
A component of the aircrack-ng suite of tools, which command-line tool is a wireless sniffing tool that can be used to discover and validate potential wireless targets? A.Kismet B.Airmon-ng C.Airbase-ng D.Airodump-ng
D.Airodump-ng
Explanation:
Airodump-ng is a command-line based, wireless sniffing tool that can be used to discover and validate potential wireless targets.
A, B, and C are incorrect. A is incorrect because Kismet is a separate tool and is not a component of the aircrack-ng suite. B and C are incorrect because while airmon-ng and airbase-ng are components of the aircrack-ng suite, airmon-ng serves to place wireless network devices in monitor mode, and airbase-ng is a tool used for attacking clients rather than the access point itself.
Which feature of Shodan is useful for investigating potential use cases via popular searches and publicly shared results? A.Explore B.Reports C.Boolean search D.Programmatic access via API keys
A.Explore
Explanation:
The Explore feature of Shodan can reveal new and interesting use cases by showing the user popular search strings and publicly shared results.
B, C, and D are incorrect. Although automated reporting, support for Boolean search terms, and a documented API for programmatic access are all significant benefits to Shodan, they are not likely to reveal potential new use cases, making these answers incorrect
The amount and kinds of risk an organization is willing to accept in its information environment are collectively known as which of the following terms? A.Severity ratings B.Risk appetite C.Tolerance to impact D.Risk acceptance
B.Risk appetite
Explanation:
Risk appetite refers to the total amount and kinds of risk an organization will tolerate in its networks
Severity ratings is incorrect because severity ratings are used to define the gravitiy of vulnerabilities identified in an organizations network
Tolerance to impact refers to the ability of an organization to withstand the effects of events or occurrences that adversely affect their business assets
Risk acceptance is incorrect because risk acceptance is defined as an organizations understanding and acceptance of the likelihood and impact of a specific threat on its systems or networks
While all of these answers influence an organizations risk appetite, the terms are only related to risk appetite rather than synonymous with it, making them incorrect
Which of the following is an access control mechanism that denies all connections that are not explicitly permitted? A.Limited access B.Blacklist C.Pirvileged-level access D.Whitelist
D.Whitelist
Explanation:
A whitelist only allows specifically identified users (based on identification mechanisms including but not limited to username, IP address and network range) with the required authorization access to access a given system or network.
A and C are incorrect because limited access and privileged-level access refer to methods of access that determine the effective starting point for a pentest.
Which term indicates an understanding and acceptance of the likelihood and impact of a specific threat on an organization’s systems or networks? A.Risk acceptance B.Scope Creep C.Tolerance to Impact D.Return on Investment
A.Risk acceptance
Explanation:
Risk acceptance is a term that indicates an understanding and willingness to bear the likelihood and impact of a specific threat to an organizations system or networks by personnel in that organizations with the authority to do so.
Scope Creep is incorrect because scope creep is the addition to or modification of an agreed upon, contracted target scope within an SOW
Tolerance to impact describes the motivation behind risk acceptance and is therefore related to it.
Return on investment is incorrect because this is often another factor in determining risk acceptance, businesses ultimately look at everything in terms of the impact to the financial bottom line.
Of the following options, in which section of a penetration test report would one expect to find a granular breakdown of evidence collected from a social engineering campaign conducted during a penetration test, including an anonymized statistical count of users who opened e-mails or clicked links? A.Methodology B.Executive Summary C.Appendixes D.Timeline
C.Appendixes
Explanation:
Nestled in the conclusions of a pentest, appendixes contain additional supporting information from a pentest that is not crucial to understanding the findings.
Methodology is incorrect because the methodology section of a pentest report focuses on explaining testing techniques and practices used.
Executive summary is incorrect because this provides a high-level overview of the findings of a pentest report
Timeline is incorrect because this is a component of the executive summary that lays out the sequence of events of a pentest
The HIPAA regulatory framework applies for what type of organization?
A.Stores and retailers that accept credit or debit cards as a means of payment for goods and services
B.U.S. government agencies, or organizations that do business with the U.S. government
C.Hospitals, health clinics, and other organizations that store patients’ personal health information, or PHI
D.Power companies, water companies, and other organizations that provide public utilities
C.Hospitals, health clinics, and other organizations that store patients’ personal health information, or PHI
Explanation:
HIPAA regulations—those imposed by the Health Insurance Portability and Accountability Act—apply to hospitals, health clinics, and other organizations that must store the personal health information of their patients.
A, B, and D are incorrect. A is incorrect because stores, retailers, and other organizations that accept debit or credit cards as a means of payment are subject to PCI DSS regulations. B is incorrect because U.S. government agencies and organizations that do business with the U.S. government are subject to the FISMA regulatory framework. D is incorrect because power and water companies and other public utilities do not have a dedicated regulatory framework for their security, but they may adhere to FISMA or other state or local guidelines as mandated by the appropriate legal authorities.
In what section of a penetration test report would one expect to find a high-level overview of the results of the test, written specifically for nontechnical stakeholders? A.Conclusion B.Methodology C.Executive summary D.Appendixes
C.Executive summary
Explanation:
The executive summary is a less technical overview of the findings of a penetration test report, geared toward clearly communicating the findings to client personnel who may not have the background or training necessary to fully understand all the minutiae of the vulnerabilities discovered.
A, B, and D are incorrect. A is incorrect because the conclusion of a penetration test report consists of supplemental material that supports the findings of that penetration test, but it is not critical to understand its contents. This can consist of figures and illustrations, appendixes that contain the results of port scans, or other granular details used during the course of the test. As such, this is far from a nontechnical section of the report, and is therefore incorrect. B is incorrect because the methodology section of a penetration test report presents information regarding testing techniques and practices used as well as the decision-making processes that guided information collection, analysis, and risk evaluation. As this is far more in the weeds than would be appropriate for a nontechnical summary, it is incorrect. D is incorrect because appendixes are a component of the conclusion of a penetration test report, and they detail the results of port scans, automated vulnerability scanners deployed in an effort to find low-hanging fruit, and other fine details. As stated previously, this is a much more detailed section of the penetration test report than is appropriate for nontechnical personnel, making this answer incorrect.
User Account Control (UAC) is a security mechanism found in Microsoft Windows operating systems, starting with Windows Vista. How does UAC enhance system security?
A.Prevents users from accessing files and directories belonging to other users of the system
B.Prevents applications from launching until a low-privilege user opens an executable
C.Restricts user applications and software to low-privilege execution unless a sysadmin authorized escalation of privilege for a given running application
D.Locks user accounts after a set number of failed logins
C.Restricts user applications and software to low-privilege execution unless a sysadmin authorized escalation of privilege for a given running application
Explanation:
By restricting application to user-level execution content, unless specifically authorized by a system admin, UAC prevents task running invisibly to the average user from escalating privileges and enabling malicious activity
Which of the following items would require specific actions taken by a penetration tester as part of the post-engagement cleanup?
A.Deleting the hardcoded credentials harvested from a user-written shell script
B.Applying a missing patch to a service exploited during the course of the engagement
C.Disabling the sa account used to compromise a MSSQL server
D.Removing a registry entry you modified to provide a reverse shell at boot time
D.Removing a registry entry you modified to provide a reverse shell at boot time
Explanation:
Adding or modifying a registry entry for the purpose of persistence is an example of a change made during the course of a penetration test. Like any other change made during the course of a penetration test, all effort should be made to revert such changes at the conclusion of the engagement; if removing a change is not possible for any reason, the exact nature of the change should be noted and passed along in the penetration test report.
A, B, and C are incorrect. All of these answers would be examples of changes to conditions discovered during the course of a penetration test. As such, the appropriate thing for a tester to do is record and report them in their findings; the onus is on the client organization to remedy these issues.
Which function of domain resolution tools returns the domain name for a given IP address by returning its associated PTR (pointer record)? A.Forward DNS Lookup B.DNS Dig C.Reverse DNS Lookup D.Cname query
C.Reverse DNS Lookup
Explanation:
A reverse DNS lookup queries the PTR record for a named IP address and then returns the associated domain name to the user
A is incorrect because forward DNS resolution requires a domain name as input and returns the associated IP address to the user. B is incorrect because “DNS dig” is not a function provided by a name resolution tool; rather, dig is the name of one such tool. D is incorrect because a cname query (or “canonical name” query) returns cname records for a given domain. A cname record is an alias by which a server is also known.
Which of the following are examples of phone-based phishing? (Choose two.)
A.SMS phishing
B.Spear phishing
C.Voice phishing
D.Baiting
A.SMS phishing
C.Voice phishing
Explanation:
SMS phishing and voice phishing (or vishing) are phishing vectors that rely on the use of phones.
B and D are incorrect. B is incorrect because spear phishing is a tightly targeted phishing attack that focuses on specific individuals who may have information or access to systems or resources desired by a penetration tester in the context of a security assessment. D is incorrect because baiting is a motivating factor defined by its use of means that tempt or entice a target into performing a given action.
The WHOIS directory service provides what information with a proper query?
A.Domain registration information
B.Website administrator contacts
C.Domain name resolution
D.Reverse lookup
A.Domain registration information
Explanation:
The WHOIS directory service provides domain registration information, including registrant and administrator names, phone numbers, and e-mail addresses.
B, C, and D are incorrect. B is incorrect because website administrator information is not required for a WHOIS entry; that information can often be found on the website in question. C and D are incorrect because domain name resolution and reverse lookup services are both provided by DNS servers. Manual queries for this information may be completed via the use of the nslookup and dig commands.
During a physical penetration test, you see a user entering their username and password on a company intranet web application while you glance over from behind as they type. What is this an example of?
A.Pretexting B.Interrogation C.Shoulder surfing D.Baiting
C.Shoulder surfing
Explanation:
Shoulder surfing is the covert observance of individuals geared toward the collection of sensitive information.
A, B, and D are incorrect. A is incorrect because pretexting is the creation of a reason—a pretext—for the penetration tester to be in a given place or to be asking for something. B is incorrect because interrogation is the use of carefully asked questions to elicit information from a target. D is incorrect because baiting is a motivating factor defined by its use of means that tempt or entice a target into performing a given action.
Which command (valid in both *nix and Windows) can resolve a domain name to its IP address? A.nslookup B.ping C.dig D.host
A.nslookup
Explanation:
The nslookup command for both Windows and *nix systems that can query DNS servers to resolve a domain name to its associated IP address, and vice versa.
B, C, and D are incorrect. B is incorrect because the ping command only sends ICMP packets to a host to confirm that it is reachable. C and D are incorrect because although both dig and host are commands that can resolve a domain name to its IP address, they are only valid in *nix operating systems and are not recognized by default on Windows operating systems.