Skip to main content
All Quizzes

CompTIA PenTest+ (PT0-002) — Complete Study Guide

469 Q&A covering all PenTest+ domains: planning & scoping, information gathering, vulnerability scanning, exploitation, reporting, and post-engagement. Includes Knowledge Check quizzes for every module and lab exercises.

Q 469 questions·CompTIA PenTest+ Guide to Penetration Testing, 1e — Cengage MindTap
Nmap
Adhering to regulatory requirements
SSH attack
Nmap
Microsoft operating systems are not readily available as virtual appliances.
The PCI-DSS lists more specific technical mandates than does the GDPR
Variables
The most convenient to use and for success of use
LDAP Injection
Enumeration
Credential brute-forcing on SSH using THC-Hydra
RFID badge cloning
Client sign off
Password spraying
ARP poisoning
Credentialed scan
Remote file inclusion attack
Completing the penetration test more quickly and under budget
A threat actor intends to cause harm to computers, devices, systems, or networks
Passive reconnaissance helps pen testers create a more defined plan for later pen test phases with little likelihood of the target being aware of the testers' activities
A3 – Sensitive data exposure
Use a vulnerability database such as Mitre.org to learn more, and then consider searching for exploits
Lab virtual machines will exactly mimic operating systems directly installed on host hardware without a hypervisor
Pacu
White box test
Authority and urgency
The systems are running web servers and host web resources
Nessus identifies missing security patches, common misconfigurations, and other vulnerabilities
Normalization
Removing credentials created by pen testers
Creating a pretext
Physical controls
Pseudocode
The type of firewall or intrusion detection devices used
C
Evil twin access point
enum4linux
XSS
All these answers may provide target information for vulnerability assessments
OSSTMM
Employ data exfiltration
Metasploit Framework
GDPR
All these answers are advantages
Risk Rating = Impact x Probability
IOCs found on target networks
Escaping a VM
Each of these is an example of scripting use for pen test automation
Critical vulnerabilities requiring immediate attention
exploited
Dropping USB drives containing malware and remote access tools outside the location
OVA
Mitre Corp's CVE.org site
The DAD triad model contains the antithesis or direct opposition to each element of the CIA triad
SOW
Nmap
IOCs
Ettercap
Snapshot
Bash is extremely common on Linux/Unix systems and can be installed natively
Jamming
Services metadata
NDA
Wifite
Spidering
Phishing
Secure shell attack
Attacking and exploiting
Statement of Work (SOW)
All of the following:
Mimikatz
5900
function
Google
Nmap
MFA
Potential financial and reputation loss associated with a particular vulnerability
Spamming
SOC
Persistence
DoS
The fees associated with pen test costs.
Hydra
Passwords
Strict mandatory firewall ruleset
USB drop attacks
Kali Linux
The names Bob, Jamal, and Sasha will be printed to the screen.
Living off the land
Evidence of candidate's successful and independent hacking of organizations or systems
Spear phishing
The servers were configured with preshared SSH keys for the other servers.
https://mysite.com/cgi-bin/getFile.pl?doc=/bin/ls |
ip addr
GDPR
session hijacking, cookie attack
NVD
Threat modeling
Pacu
Pivoting
debugger
Trade secrets of the client
Competitor
dumpster diving
REPL
Feeds
BusyBox
hciconfig
de-confliction
Wireshark
802.11c
Vistumbler
ipconfig
A purposefully vulnerable virtual machine useful for practicing pen testing
1.3 billion
True
An Open Virtual Appliance
12
January 2020
Brute force attack exploits; Vulnerability discovery; SQL injection exploits
ip addr; ifconfig
By adding the Active Directory Domain Services role
A virtualization platform
The MITRE ATT&CK framework
NDA
False
Implementing security changes to address GDPR requirements
SLA
True
ROE
SOW
False
GDPR; PCI DSS
GDPR
72 hours
Practices that ensure organizational activities are aligned to support the organization's business goals.
• Censys • Shodan
True
• GPS coordinates • Creation date • Servers • Author
• Packet sniffing • Packet interception
ipconfig /dnsregister
Thoroughly analyzing a website looking for information that can be extracted
Dumpster diving
Exploitation
True
True
All the answers
True
-sP
• Faking or changing the address of the scanning machine regularly • Limiting the number of ports being scanned • Scanning only a few targets at a time • Increasing times between scans
True
Analyzing social media platforms (such as Facebook, Twitter, and LinkedIn) to gather useful intelligence
-T
Open source intelligence
False
Nessus
Vulnerability scanning can generate a lot of network traffic so steps should be taken to not overwhelm the network.
True
• Proactive decision • Corporate policy • Reactive decision • Regulatory requirements
Fuzzing
H
True
True
SAST
Credentialed scan
OWASP
• 6.9 • 4.0
A way of providing applications to computers and end users that is similar to virtual machines
The attacker must be able to physically touch the device.
True
• PsExec • WMI • WinRM • RPC
Social engineering
True
False
True
Pivoting
• Using brute-force tools • Gathering usernames and email addresses using OSINT tools • Guessing • Extracting usernames from /etc/passwd or c:\users
show
pwdump
True
False
Privilege escalation
False
Malware that is loaded directly into memory
• Scheduled jobs or tasks • Service manipulation • Creating accounts • Backdoors
• DHCP control • Software agents • Switch port security • Network traffic analysis • SNMP traps
False
True
• EternalBlue • Public SMB shares • Responder • Metasploit Framework
An attack that overwhelms a target with communication causing the target to be unable to perform its normal functions
True
A family of attacks that involve threat actors intercepting and manipulating normal communications
NetBIOS
True
False
Exploit chaining
Attacks that interfere with normal ARP broadcasts by returning fake MAC addresses
• Performing NetBIOS spoof attacks • Performing LLMNR spoof attacks • Performing DNS spoof attacks;
Demogorgon
True
True
• Using information gathered during reconnaissance • Using vulnerability scanning results indicating usable exploits • Using nmap open port information • Using information from exploit databases (Exploit DB, Packet Storm)
• Rogue access points • Compromised smartphones • Captive portals
Service set identifier, a name used to identify a wireless network that wireless access points often broadcast to indicate availability
Wi-Fi Protected Setup, a wireless standard that allows users to easily and securely add devices to a wireless network
• Checking for available wireless networks that are available to connect to using a smartphone or wireless laptop • Using wireless scanning programs such as Vistumbler • Wardriving • Using command utilities such as airodump-ng
• Insecure storage • Passcode vulnerabilities • Root-level access • Biometric vulnerabilities
Bluetooth Low Energy attack, an attack against a low-energy consumption Bluetooth protocol variant often found in IoT devices
• airodump-ng • aircrack-ng • airmon-ng • wash • aireplay-ng
Deauthentication
A rogue AP that uses the same name as a legitimate AP
• Sandbox analysis • NFC attacks • Spamming • Reverse-engineering
False
• Hackers making phone calls from compromised phones • Contact information being stolen from smartphones • Hackers sending messages from compromised devices • IoT devices being hacked
A wireless user trying to connect to a WLAN that uses 802.1X authentication
A passive scanner that can detect hidden network SSIDs
Industrial Internet of Things, IoT devices and technology that are being used for industrial applications such as ICS and SCADA
True
False
Redirect attack
Busting
Testing application input fields with an overwhelming amount of input to see if the application crashes or perhaps fails some input validation tests
Interception proxy
Click jacking
True
CSRF/XSRF attack
• Stored procedures • Input validation
LDAP attack
• Boolean blind SQL injection attack • Injection attack • SQL injection attack • Timing-based blind SQL injection
• Parameter pollution • Privilege escalation • IDOR • File inclusion • Directory traversal
SQL injection attacks
Kerberos attack
Frida
• Sandbox analysis • Theft of information • Spamming • Reverse engineering
False
Command injection attack
• wmic • Device Manager • system-detect-virt • ls –l /dev/disk/by-id
Security Accounts Manager database
Direct-to-origin (D2O)
• Defaults • Brute-force attacks • Stored credentials • File system permission configuration errors
• uname -a • lsb_release -a
Containers
True
• NETCAT • Ncat • Metasploit Framework • SSH
find / -perm -4000
• pwdump • lsadump • cachedump
Data storage exploits
Side-channel
Account takeover
When executed, the file will run with the permissions of the owner of the file and not those of the user executing the file.
VM escape
A Windows registry location that stores the password of the currently logged-in user (and other sensitive authentication secrets)
Attempts to run commands using root-level permissions
Cloud redirect
• SSH is often installed by default on Linux hosts • SSH provides for encrypted communication that can be used to hide a threat actor's activities • SSH can be used to encapsulate other types of traffic by using it for port forwarding.
Vishing
Watering hole
False
False
Browser Exploitation Framework
• Quid pro quo • Elicitation • Impersonation • Interviews
Shoulder surfing
BeEF
Social engineering
True
Tailgating
Bumping
Pretexting
Dumpster diving
Social engineering
• INVITE • Viproy
Phishing
Urgency
Authority
A believable situation that legitimizes why the threat actor is asking the victim to do something
• Indicators of prior compromise • IOCs
True
Post-engagement cleanup
Operational controls
Stage initiation
Technical controls
Physical controls
Appendix
• Situational awareness • De-escalation • Goal reprioritization • De-confliction
• Primary contact • Emergency contact • Technical contact
Risk rating
Normalization of data
Administrative controls
• Unnecessary open services • Shared local administrator credentials • Authentication issues such as weak password complexity, plain text passwords, or lack of MFA • SQL injection vulnerabilities
True
True
True
Executive summary
Attestation of findings
• Operational controls • Technical controls • Administrative controls • Physical controls
• for loop • do loop • while loop
"I made a mistake!" is displayed.
• Testing • Branching • Looping
A main() function
Syntax error
do loop
5
for (;;)
True
A set of instructions for solving a specific problem
Pseudocode
#
FsType( )
<a href="http://URL">
The “*” character in front of the lst variable allows the printing of the list elements in a single line
Escapes the period
The OS library
# identifies a comment line
Python is not specific to an OS
#!/bin/bash
• || • &&
==
• Nano • Vim
e
BitLocker
PTES (Penetration Testing Execution Standard)
Sanitize user input
Executive Summary
• Report of findings • Permission to hack
NIST
Password reuse
It is configured as an Alert
• The GPO will automatically be implemented within approximately 2 hours of creation or modification • The GPO can be at each individual workstation
A minimum age prevents a user from cycling through password resets to defeat the password history policy
Security Account Manager (SAM) Database; /etc/shadow
John the Ripper
LM; MD4
Typosquatting
Rockyou.txt
Burpsuite
Hydra
A mathematical equivalency is entered into the input field with a Boolean OR to always return a true value
This comments out the rest of the SQL statement on the server side
A tool that automatically performs exploitation on SQL databases
Session Fixation
Upon initial contact
Session Hijacking
• To ensure the user does not need to authenticate to each page • To track the client’s session
Only traffic to 10.0.0.254 is displayed
OWASP ZAP
By placing it in the Online Browsers folder of the Hooked Browsers frame
Msfvenom
• Safe mode • Attack mode • Standard mode
Lack of input validation
Horizontal privilege escalation
Vertical privilege escalation
OpenStego
• Erase the PSReadLine module history file • The Clear-History command
-ns
• -sV • -sC • -traceroute • -O
-sT
The -sS scan does not complete the three-way TCP connection handshake
-Pn
UDP
• Greenbone Vulnerability Manager (GVM) • Linux
NVTs may be updated daily. To ensure the scan includes the newest NVTs, update the status prior to conducting the scan
A summary of the individual vulnerability test packet
Many hours
Encrypted and stored on a protected drive
Passive Reconnaissance collection makes every effort to not interact directly with the target
• Knowing the email suffix and format of the email prefix allows an ethical hacker to guess valid emails in the target domain • The email address could be checked by the haveibeenpwned.com website to determine whether it has been in a breach • The discovered email address could be used in a spear phishing campaign
API Key
TCP/43
FALSE
• The allow statement means that Bingbot is allowed to index any URL that ends in “html” • The Bingbot is not allowed to index any website pages that include the /passwords/ path
• -sV: Version Detection Scan • -sC: Script Scan
A Web Server
Load Balancer
Geolocation data of an iPhone photograph
cURL
Lockheed Martin Cyber Kill Chain
Grep
U.S. Government
Common Vulnerabilities and Exposures (CVE)
SP 800-115
Who will receive the report after the test is complete
Attacking and exploitation
Backdoor
Aircrack-ng
ISO
ipconfig
SMTP
Greylisting
Use the Virtual Keyboard in VirtualBox
Governance
Security Standards Council
12
Ensure an organization is complying with GDPR laws
Sarbanes-Oxley (SOX) Act
The recipient can conclusively say the message was sent by Amir.
!!A digital signature contains a public key; A digital certificate contains a digital signature.
An RA performs functions on behalf of a CA.
Using the OCSP; Configure a certificate revocation repository
Keep it powered down until needed; Allow local access only from an isolated network.
Email; Software; Printer
Direct trust; Web of trust
Back up expired keys and place them offline; Treat unrevoked keys with same security as active keys.
The security of the transmitted data will be compromised.
IPSec authenticates that packets received were sent from the source; !!!IPSec supports tunnel mode while TLS supports transport mode to transmit and receive data.
Extortion
The consequences are considerable; Payments via cryptocurrency are hard to trace.Payments must be made using cryptocurrency, making it difficult to track the attacker.
Spyware does not capture keyboard input.
Fileless virus
Zombie
For privilege escalation; To circumvent security protections.
Buffer overflow
Network; Databases; App servers
CSRF takes advantage of authentication tokens; CSRF pretends to be an authorized user; SSRF can inject harmful data.
Use secure cookies; Use HTTPS
They have access to sensitive data.
Geolocation
Downloaded apps may contain malware that bypass the phone’s security.
Use containerization.
MAM (Mobile Application Management)
Geofencing
It orchestrates communication between IC chips very efficiently.
A cryptographic algorithm should have low latency; Decreasing latency in a cryptographic algorithm makes it run faster.
Executable file attack; System tampering
To obfuscate or camouflage code; Because it’s a secure coding technique.
SP 800-115
The tool that will be used against the network
Attacking and exploitation
Backdoor
Aircrack-ng
ISO
ipconfig
SMTP
Greylisting
Press the Tab key and select the first option, C+A+D, from the menu.
Governance
Security Standards Council
12
Ensure an organization is complying with GDPR laws
Sarbanes-Oxley (SOX) Act
The recipient can conclusively say the message was sent by Amir.
A digital certificate contains a digital signature; A digital certificate can contain a postal address.
An RA performs functions on behalf of a CA.
Using the OCSP; Configure a certificate revocation repository
Keep it powered down until you need to issue or reissue certificates.
Email, Printer, Software
Direct trust, Web of trust
Store keys in folders that are themselves encrypted; Treat unrevoked keys with the same level of security as active keys.
The security of the transmitted data will be compromised.
IPSec authenticates that packets received were sent from the source; IPSec manages the keys to ensure they are not intercepted by unauthorized parties.
Extortion
The consequences are considerable; They occur with very high frequency.
Spyware and keyloggers capture keystrokes.
Fileless virus
zombie
For privilege escalation purposes; To circumvent security protections
Buffer overflow
Network, Databases, App servers
A CSRF attack takes advantage of an authentication token; A CSRF attack pretends to be an authorized user; A SSRF attack can inject harmful data.
Use secure cookies; Use HTTPS
They have access to sensitive data.
Geolocation
Downloaded apps may contain malware that bypass the phone's security.
Use containerization.
MAM
Geofencing
It orchestrates communication between IC chips very efficiently.
A cryptographic algorithm should have low latency; Decreasing latency in a cryptographic algorithm speeds up normal operations of low-power devices.
System tampering; Process spawning control
Because it is one of the secure coding techniques the organization uses; To further obfuscate or camouflage the code, making it difficult for attackers to understand.

These answers are free — always.

If this study guide helped you prepare for your exam, consider extending a hand to Mary & Lydia through AbleHearts — a community supporting those in need. Even a small contribution makes a real difference.

Donate to AbleHearts

able-hearts.org/donate · Helping Mary & Lydia