CompTIA Pentest+ Chapter 4 Questions Flashcards

1
Q

MITRE is a nonprofit organization that provides access to public community resources for conducting vulnerability research and analysis.
Which community resources are provided by MITRE?
A.CWE
B.CEW
C.CEV
D.CVE
E.CAPEC

A

A.CWE
D.CVE
E.CAPEC

Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
The CVE Dictionary is a standard used for documenting which type of vulnerabilities?
A.Public
B.Privately allowed
C.Privately disclosed
D.Publicly disclosed
A

D.Publicly disclosed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Nessus plugins are written in which type of proprietary language?
A.NCE
B.NASL
C.NSAL
D.Nessus
A

B.NASL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SCADA systems are made up of components like the supervisory workstation, RTUs, PLCs, communication infrastructure and human machine interfaces.
Modbus is a popular protocol that operates on which default port?
A.502/udp
B.500/tcp
C.302/udp
D.502/tcp

A

D.502/tcp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Real-time Operating Systems (RTOs) are typically found in embedded devices such as routers, IP cameras, health care devices and so forth.

There are multiple classifications of RTOS devices.

Which classification must adhere to time constraints for an associated task?
A.Hard
B.Firm 
C.Soft
D.All of the above
A

D.All of the above

Explanation:
All RTOSs must adhere to time constraints, regardless of impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Burp Suite Pro is a web-based security assessment tool that provides the ability to proxy service manual testing requests during a pentest.

What is the name of a similar tool, developed by OWASP, that provides similar web application testing abilities?
A.ZAP
B.DirBuster
C.Webgoat
D.Nessus
A

A.ZAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

During a pentest, you discover a sitemap.xml file and crossdomain.xml file.

These files can provide useful information for mapping out web directories and files that would otherwise have to be brute-forced.

What is the name of another file that can provide URLs and URI locations that restricts search engines from crawling certain locations?
A.policy.xml
B.site.txt
C.robots.txt
D.crossdomain.policy
A

C.robots.txt

Explanation:
A robots.txt file tells search engine crawlers which URLs the crawler can access on your site.

This is used mainly to avoid overloading your site with request, it is not a mechanism for keeping a web page out of Google though

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
DirBuster is a multi threaded Java application that can brute-force filenames and directories on web and web application servers using what type of dictionary?
A.List
B.Wordlist
C.Application list
D.Webster
A

B.Wordlist

Explanation:
Word list is the correct answer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following best describes a hash collision attack?
A. A hash value that provides weak encryption
B.An attempt to find two inputs that produce the same hash value
C.It is an attempt to decrypt messages
D.It provides a method for circumventing the cryptographic system

A

B.An attempt to find two inputs that produce the same hash value

Explanation:
Collision attacks are caused by two inputs producing the same hash value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which type of XSS vulnerability is known as being persistent?
A.Reflected
B.Stored
C.DOM
D.All of the above
A

B.Stored

Explana

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
What is the prefix name for Oracle database management system errors?
A.OAR
B.MSG
C.ORA
D.CVE
A

C.ORA

Explanation:
ORA is the correct prefix for Oracle database errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly