CompTIA CySA+ Set 12

Which of the following items is not one of the three important rules that should be established before a penetration test?


Options are :

  • Timing
  • Reporting
  • Scope
  • Authorization

Answer :Reporting

Scott is part of the white team who is overseeing his organizationís internal red and blue teams during an exercise that requires each team to only perform actions appropriate to the penetration test phase they are in. During the reconnaissance phase, he notes the following behavior as part of a Wireshark capture. What should he report?


Options are :

  • The blue team has succeeded.
  • The red team is violating the rules of engagement.
  • The red team has succeeded.
  • The blue team is violating the rules of engagement.

Answer :The red team is violating the rules of engagement.

CompTIA Security+ (SY0-501) Practice Exams with Simulations Set 6

Jennifer analyzes a Wireshark packet capture from a network that she is unfamiliar with. She discovers that a host with IP address 10.11.140.13 is running services on TCP ports 636 and 443. What services is that system most likely running?


Options are :

  • LDAPS and HTTPS
  • FTPS and HTTPS
  • RDP and HTTPS
  • HTTP and Secure DNS

Answer :LDAPS and HTTPS

Lauren inputs the following command on a Linux system:

#echo 127.0.0.1 example.com >> /etc/hosts

What has she done?


Options are :

  • She has added the system to the allowed hosts file.
  • She has routed traffic for the example.com domain to the local host.
  • She has routed local host traffic to example.com.
  • She has overwritten the hosts file and will have deleted all data except this entry.

Answer :She has routed traffic for the example.com domain to the local host.

While reviewing Apache logs, Cynthia notices the following log entries. What has occurred?

10.0.1.1 - POST /wordpress/wp-content/r57.php?1 200

10.0.1.1 - GET /wordpress/wp-content/r57.php 200


Options are :

  • A file was downloaded and verified.
  • A file was emailed.
  • A file was moved to the wp-content directory.
  • A file was uploaded and verified.

Answer :A file was uploaded and verified.

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 22

Rhonda has identified a privilege escalation flaw on the system she targeted in the first phase of her penetration test and is now ready to take the next step. According to the NIST 800-115 standard, what is step C that Rhonda needs to take, as shown in this diagram?


Options are :

  • System browsing
  • Scanning
  • Rooting
  • Consolidation

Answer :System browsing

While conducting a penetration test, Ben executes the following command:

ifconfig eth0 hw ether 08:00:27:06:d4

What network protection is Ben most likely attempting to avoid?


Options are :

  • Port security
  • NAC
  • A firewall
  • An IPS

Answer :Port security

When Scott performs an nmap scan with the -T flag set to 5, what variable is he changing?


Options are :

  • How fast the scan runs
  • The TCP timeout flag it will set
  • How many retries it will perform
  • How long the scan will take to start up

Answer :How fast the scan runs

FC0-TS1 CompTIA Strata IT for Sales Practice Exam Set 4

While conducting a port scan of a remote system, Henry discovers TCP port 1433 open. What service can he typically expect to run on this port?


Options are :

  • Oracle
  • VNC
  • IRC
  • Microsoft SQL

Answer :Microsoft SQL

Every year, Alice downloads and reads a security industry published list of all the types of attacks, compromises, and malware events that have occurred, that are becoming more prevalent, and that are decreasing in occurrence. What type of analysis can she perform using this information?


Options are :

  • Anomaly
  • Trend
  • Heuristic
  • Availability

Answer :Trend

While application vulnerability scanning one of her target organizations web servers, Andrea notices that the serverís hostname is resolving to a cloudflare.com host. What does Andrea know about her scan?


Options are :

  • It is being treated like a DDoS attack.
  • It is scanning a CDN-hosted copy of the site.
  • It will not return useful information.
  • She cannot determine anything about the site based on this information.

Answer :It is scanning a CDN-hosted copy of the site.

CompTIA Security+ (SY0-501) Practice Exams with Simulations Set 2

While conducting active reconnaissance, Lauren discovers a web remote management application that appears to allow Windows command-line access on a server. What command can she run to quickly determine what user the service is running as?


Options are :

  • username
  • showuser
  • whoami
  • cd c:\Users\%currentuser

Answer :whoami

While tracking a potential APT on her network, Cynthia discovers a network flow for her companyís central file server. What does this flow entry most likely show if 10.2.2.3 is not a system on her network?

Date flow start Duration Proto Src IP Addr:Port Dst IP Addr:Port Packets Bytes Flows

2017-07-11 13:06:46.343 21601804 TCP 10.1.1.1:1151->10.2.2.3:443 9473640 9.1 G 1

2017-07-11 13:06:46.551 21601804 TCP 10.2.2.3:443->10.1.1.1:1151 8345101 514 M 1


Options are :

  • A web browsing session
  • Data exfiltration
  • Data infiltration
  • A vulnerability scan

Answer :Data exfiltration

Chris wants to prevent users from running a popular game on Windows workstations he is responsible for. How can Chris accomplish this for Windows 10 Pro workstations?


Options are :

  • Using application whitelisting to prevent all unallowed programs from running
  • Using Windows Defender and adding the game to the blacklist file
  • By listing it in the Blocked Programs list via secpol.msc
  • You cannot blacklist applications in Windows 10 without a third-party application.

Answer :Using application whitelisting to prevent all unallowed programs from running

CompTIA 220-801 A+ Advanced Certification Practice Exam Set 9

After a series of compromised accounts led to her domain being blacklisted, Lauren has been asked to restore her companyís email as quickly as possible. Which of the following options is not a valid way to allow her company to send email successfully?


Options are :

  • Migrate her companyís SMTP servers to new IP addresses.
  • Migrate to a cloud email hosting provider.
  • Change SMTP headers to prevent blacklisting.
  • Work with the blacklisting organizations to get removed from the list.

Answer :Change SMTP headers to prevent blacklisting.

Part of Tracyís penetration testing assignment is to evaluate the WPA2 Enterprise protected wireless networks of her target organization. What major differences exist between reconnaissance of a wired network versus a wireless network?


Options are :

  • Encryption and physical accessibility
  • Network access control and encryption
  • Port security and physical accessibility
  • Authentication and encryption

Answer :Encryption and physical accessibility

Ianís company has an internal policy requiring that they perform regular port scans of all of their servers. Ian has been part of a recent effort to move his organizationís servers to an infrastructure as a service provider. What change will Ian most likely need to make to his scanning efforts?


Options are :

  • Change scanning software.
  • Follow the service providerís scan policies.
  • Sign a security contract with the provider.
  • Discontinue port scanning.

Answer :Follow the service providerís scan policies.

SK0-004 CompTIA Server+ Certification Practice Exam Set 7

During a regularly scheduled PCI compliance scan, Fred has discovered port 3389 open on one of the point-of-sale terminals that he is responsible for managing. What service should he expect to find enabled on the system?


Options are :

  • MySQL
  • RDP
  • TOR
  • Jabber

Answer :RDP

Cynthia knows that the organization she is scanning runs services on alternate ports to attempt to reduce scans of default ports. As part of her intelligence-gathering process, she discovers services running on ports 8080 and 8443. What services are most likely running on these ports?


Options are :

  • Botnet C&C
  • Nginx
  • Microsoft SQL Server instances
  • Web servers

Answer :Web servers

Lauren wants to identify all the printers on the subnets she is scanning with nmap. Which of the following nmap commands will not provide her with a list of likely printers?


Options are :

  • nmap -sS -p 9100,515,631 10.0.10.15/22 -oX printers.txt
  • nmap -O 10.0.10.15/22 -oG - | grep printer >> printers.txt
  • nmap -sU -p 9100,515,631 10.0.10.15/22 -oX printers.txt
  • nmap -sS -O 10.0.10.15/22 -oG | grep >> printers.txt

Answer :nmap -sU -p 9100,515,631 10.0.10.15/22 -oX printers.txt

CompTIA JK0-018 Security+ E2C Certified Practice Exam Set 6

Charles wants to use active discovery techniques as part of his reconnaissance efforts. Which of the following techniques fits his criteria?


Options are :

  • Google searching
  • Using a Shodan search
  • Using DNS reverse lookup
  • Querying a PGP key server

Answer :Using DNS reverse lookup

JK0-019 CompTIA E2C Network + Certification Exam Set 3

During the reconnaissance stage of a penetration test, Cynthia needs to gather information about the target organizationís network infrastructure without causing an IPS to alert the target to her information gathering. Which of the following is her best option?


Options are :

  • Perform a DNS brute-force attack.
  • Use an nmap ping sweep.
  • Perform a DNS zone transfer.
  • Use an nmap stealth scan.

Answer :Perform a DNS brute-force attack.

Tiffany needs to assess the patch level of a Windows 2012 server and wants to use a freely available tool to check the system for security issues. Which of the following tools will provide the most detail about specific patches installed or missing from her machine?


Options are :

  • nmap
  • Nessus
  • MBSA
  • Metasploit

Answer :MBSA

Charleen is preparing to conduct a scheduled reconnaissance effort against a client site. Which of the following is not typically part of the rules of engagement that are agreed to with a client for a reconnaissance effort?


Options are :

  • Timing
  • Scope
  • Exploitation methods
  • Authorization

Answer :Exploitation methods

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 4

A port scan of a remote system shows that port 3306 is open on a remote database server. What database is the server most likely running?


Options are :

  • Oracle
  • Postgres
  • MySQL
  • Microsoft SQL

Answer :MySQL

Maria wants to deploy an anti-malware tool to detect zero-day malware. What type of detection method should she look for in her selected tool?


Options are :

  • Signature based
  • Heuristic based
  • Trend based
  • Availability based

Answer :Heuristic based

During a port scan of her network, Cynthia discovers a workstation that shows the following ports open. What should her next action be?


Options are :

  • Determine the reason for the ports being open.
  • Investigate the potentially compromised workstation.
  • Run a vulnerability scan to identify vulnerable services.
  • Reenable the workstationís local host firewall.

Answer :Determine the reason for the ports being open.

BR0-002 CompTIA Network + Bridge Practice Exam Set 5

Charles wants to provide additional security for his web application that currently stores passwords in plain text in a database. Which of the following options is his best option to prevent theft of the database from resulting in exposed passwords?


Options are :

  • Encrypt the database of plain-text passwords.
  • Use MD5 and a salt.
  • Use SHA-1 and a salt.
  • Use bcrypt.

Answer :Use bcrypt.

Cameron needs to set up a Linux iptables-based firewall ruleset to prevent access from hosts A and B, while allowing SMTP traffic from host C. Which set of the following commands will accomplish this?


Options are :

  • # iptables -I INPUT 2 -s 10.1.1.170 -j DROP # iptables -I INPUT 2 -s 10.2.0.0/24 --dport 25 -j DROP # iptables -I INPUT 2 -s 10.2.0.130 --dport 25 -j ALLOW
  • # iptables -I INPUT 2 -s 10.1.1.170 -j DROP # iptables -I INPUT 2 -s 10.2.0.0.134 -j DROP # iptables -I INPUT 2 -s 10.2.0.130 --dport 25 -j ALLOW
  • # iptables -I INPUT 2 -s 10.1.1.170 -j ALLOW # iptables -I INPUT 2 -s 10.2.0.0.134 -j ALLOW # iptables -I INPUT 2 -s 10.2.0.130 --dport 25 -j DROP
  • # iptables -I INPUT 2 -s 10.1.1.170 -j DROP # iptables -I INPUT 2 -s 10.2.0.0.134 -j DROP # iptables -I INPUT 2 -s 10.2.0.130 -j ALLOW

Answer :# iptables -I INPUT 2 -s 10.1.1.170 -j DROP # iptables -I INPUT 2 -s 10.2.0.0.134 -j DROP # iptables -I INPUT 2 -s 10.2.0.130 --dport 25 -j ALLOW

After filling out the scoping document for a penetration test, including details of what tools, techniques, and targets are included in the test, what is the next step that Jessica needs to take to conduct the test?


Options are :

  • Port scan the target systems.
  • Get sign-off on the document.
  • Begin passive fingerprinting.
  • Notify local law enforcement.

Answer :Get sign-off on the document.

FC0-U41 CompTIA Strata IT Fundamentals Practice Test Set 4

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions

<`Ł~ZÝU`Ł~ZÝUŗōuZÝU@:~ZÝU»Ł~ZÝUÄŁ~ZÝUOÄŁ~ZÝUgin" action="../cmt/post_subscribe/" method='post'>