CompTIA Pentest+ Chapter 4 Questions Flashcards
MITRE is a nonprofit organization that provides access to public community resources for conducting vulnerability research and analysis.
Which community resources are provided by MITRE?
A.CWE
B.CEW
C.CEV
D.CVE
E.CAPEC
A.CWE
D.CVE
E.CAPEC
Explanation:
The CVE Dictionary is a standard used for documenting which type of vulnerabilities? A.Public B.Privately allowed C.Privately disclosed D.Publicly disclosed
D.Publicly disclosed
Nessus plugins are written in which type of proprietary language? A.NCE B.NASL C.NSAL D.Nessus
B.NASL
SCADA systems are made up of components like the supervisory workstation, RTUs, PLCs, communication infrastructure and human machine interfaces.
Modbus is a popular protocol that operates on which default port?
A.502/udp
B.500/tcp
C.302/udp
D.502/tcp
D.502/tcp
Real-time Operating Systems (RTOs) are typically found in embedded devices such as routers, IP cameras, health care devices and so forth.
There are multiple classifications of RTOS devices.
Which classification must adhere to time constraints for an associated task? A.Hard B.Firm C.Soft D.All of the above
D.All of the above
Explanation:
All RTOSs must adhere to time constraints, regardless of impact
Burp Suite Pro is a web-based security assessment tool that provides the ability to proxy service manual testing requests during a pentest.
What is the name of a similar tool, developed by OWASP, that provides similar web application testing abilities? A.ZAP B.DirBuster C.Webgoat D.Nessus
A.ZAP
During a pentest, you discover a sitemap.xml file and crossdomain.xml file.
These files can provide useful information for mapping out web directories and files that would otherwise have to be brute-forced.
What is the name of another file that can provide URLs and URI locations that restricts search engines from crawling certain locations? A.policy.xml B.site.txt C.robots.txt D.crossdomain.policy
C.robots.txt
Explanation:
A robots.txt file tells search engine crawlers which URLs the crawler can access on your site.
This is used mainly to avoid overloading your site with request, it is not a mechanism for keeping a web page out of Google though
DirBuster is a multi threaded Java application that can brute-force filenames and directories on web and web application servers using what type of dictionary? A.List B.Wordlist C.Application list D.Webster
B.Wordlist
Explanation:
Word list is the correct answer
Which of the following best describes a hash collision attack?
A. A hash value that provides weak encryption
B.An attempt to find two inputs that produce the same hash value
C.It is an attempt to decrypt messages
D.It provides a method for circumventing the cryptographic system
B.An attempt to find two inputs that produce the same hash value
Explanation:
Collision attacks are caused by two inputs producing the same hash value
Which type of XSS vulnerability is known as being persistent? A.Reflected B.Stored C.DOM D.All of the above
B.Stored
Explana
What is the prefix name for Oracle database management system errors? A.OAR B.MSG C.ORA D.CVE
C.ORA
Explanation:
ORA is the correct prefix for Oracle database errors.