Ethical Hacking and CompTIA PenTest+ with 2 Practice Tests Set 2

Which of the following are considered examples of threat actors? (Choose four.)


Options are :

  • Pentester
  • Hactivist
  • Advanced persistent threat
  • Script kiddie
  • Insider threat

Answer :Hactivist Advanced persistent threat Script kiddie Insider threat

CAS-001 CompTIA Advanced Security Practitioner Practice Exam Set 10

VNC passwords that rely on DES encryption can be a maximum of how many characters in length?


Options are :

  • 8
  • 10
  • 12
  • 6

Answer :8

Which testing methodology or methodologies should an organization consider when scoping and planning for an engagement? (Choose all that apply.)


Options are :

  • White box
  • All of the answer choices are correct
  • Gray box
  • Black box

Answer :All of the answer choices are correct

Which exception will be printed when the characters '[email protected]#' are provided as input to the program based on the following Python code?

#!/usr/bin/python

try:

i - int(input("Enter your favorite number: "))

break

except NameError:

print("Name Error Exception")

except SyntaxError:

print("Syntax Error Exception")

except:

print("Generic Error")


Options are :

  • Keyboard Interrupt Exception
  • Name Error Exception
  • Syntax Error Exception
  • Generic Exception

Answer :Syntax Error Exception

Which of the following tools can be used for remote password cracking of web servers? (Choose two.)


Options are :

  • BlackWidow
  • Nikto
  • THC-Hydra
  • Brutus

Answer :THC-Hydra Brutus

Which of the following is the best choice for protection against privilege escalation vulnerabilities?


Options are :

  • Ensure drivers are appropriately signed.
  • Ensure services run with least privilege.
  • Make maximum use of automated services.
  • Set admin accounts to run on least privilege.

Answer :Ensure services run with least privilege.

What presents the highest risk to a target network or resource?


Options are :

  • A disgruntled employee
  • Script kiddies
  • A white-hat attacker
  • Phishing

Answer :A disgruntled employee

JK0-802 CompTIA A+ Certification Exam Set 1

Which of the following best describes a hybrid password-cracking attack?


Options are :

  • It uses a rainbow table to crack the password.
  • It uses a combination of letters, numbers, and special characters in random order to crack the password.
  • It substitutes numbers and characters in words to discover a password.
  • It uses a dictionary file to crack the password.

Answer :It substitutes numbers and characters in words to discover a password.

Which of the following allow for Bluetooth device discovery? (Choose two.)


Options are :

  • BlueScanner
  • BT Browser
  • PhoneSnoop
  • BBProxy

Answer :BlueScanner BT Browser

A standard ping sweep using ICMP over TCP attempts to identify live hosts on the network. Which of the following provides an explanation for no response from a ping request?


Options are :

  • The hosts might be turned off or disconnected.
  • All of the answers are correct.
  • ICMP is being filtered.
  • The destination network might be down.
  • TTL value is too low.

Answer :All of the answers are correct.

CompTIA JK0-022 Security Cryptography Certification Exam Set 3

Operations promotes the use of mobile devices in the enterprise. Security disagrees, noting multiple risks involved in adding mobile devices to the network. Which of the following provides some protections against the risks security is concerned about?


Options are :

  • Implement WPA.
  • Ensure all WAPs are from a single vendor.
  • Add MAC filtering to all WAPs.
  • Implement MDM.

Answer :Implement MDM.

Amazon's EC2 provides virtual machines that can be controlled through a service API. Which of the following best defines this service?


Options are :

  • SaaS
  • Public
  • PaaS
  • IaaS

Answer :IaaS

Which of the following is defined as a process of evaluating assets to determine the amount of vulnerability each represents to the organization?


Options are :

  • Vulnerability scanning
  • Risk assessment
  • Security analysis
  • Pen test

Answer :Risk assessment

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 12

A security tester wants to see what can be found from the company's public-facing web servers. He enters the command nc 187.55.66.77 80. The returned output reads as follows:HTTP/1.1 200 OKServer: Microsoft-IIS/6Expires: Tue, 17 Apr 2016 01:41:33 GMTDate: Mon, 16 Apr 2016 01:41:33 GMTContent-Type: text/htmlAccept-Ranges: bytesLast-Modified: Wed, 28 Dec 2015 15:32:21 GMTETag: "b0aac0542e25c31:89d"Content-Length: 7369Which of the following is an example of what the engineer performed?


Options are :

  • Cross-site scripting
  • SQL injection
  • Whois database query
  • Banner grabbing

Answer :Banner grabbing

CL0-001 CompTIA Cloud Essentials Practice Test Set 7

What is something you want to document after a pentest to prevent similar events and issues from happening in the future, or something you want to document that went well during the pentest?


Options are :

  • Findings
  • Escalation path
  • Lessons learned
  • Methodology

Answer :Lessons learned

Which of the following best describes a red team?


Options are :

  • Security team members dedicated to policy audit review
  • Security team members with full knowledge of the internal network
  • Security team members defending a network
  • Security team members attacking a network

Answer :Security team members attacking a network

SY0-401 CompTIA Security+ Certification Practice Exam Set 6

Which of the following best describes a biometric passport?


Options are :

  • Something you require
  • Something you know
  • Something you have
  • Something you are

Answer :Something you have

You have an FTP service and an HTTP site on a single server. Which DNS record allows you to alias both services to the same record (IP address)?


Options are :

  • CNAME
  • NS
  • PTR
  • SOA

Answer :CNAME

You have network IPS set up, along with multiple other tools for security controls. This morning before you came to work, hackers successfully attacked the network. In investigating, you see that the IPS saw the traffic coming into the network and leaving, but did not alert on it. Which of the following best describes what the IPS noted?


Options are :

  • True positive
  • True negative
  • False negative
  • False positive

Answer :False negative

CompTIA Network+ 6 Certification Practice Exams - 2019 Set 16

A security staff implements a network IDS and a host-based IDS. Which security control role is being implemented?


Options are :

  • Defensive
  • Corrective
  • Detective
  • Preventive

Answer :Detective

Examine the following command :nmap -d -script ssl-heartbleed -script-args vulns.showall -sV [host]Which of the following would you expect to see returned?


Options are :

  • An error response because the syntax and script are invalid
  • A return of "State: NOT VULNERABLE" on systems protected against Heartbleed
  • None of the answers are correct.
  • A list of SSL versions within the scan scope

Answer :A return of "State: NOT VULNERABLE" on systems protected against Heartbleed

Which nmap script can be used to show potentially risky HTTP methods?


Options are :

  • http-methods
  • http-get
  • http-headers
  • http-risk

Answer :http-methods

SY0-401 CompTIA Security+ Certification Practice Exam Set 2

NIST SP 800-30 defines this as the step that determines whether any weaknesses exist in an organization's systems, policies, or procedures. Which of the following best matches this definition?


Options are :

  • Impact analysis
  • Risk determination
  • Threat identification
  • Vulnerability identification

Answer :Vulnerability identification

Which of the following is the best way to defend against network sniffing?


Options are :

  • Use MAC controls on switches.
  • Use static IP addressing throughout the network.
  • Implement encryption throughout the environment.
  • Implement strong physical security control measures.

Answer :Implement encryption throughout the environment.

You are performing reconnaissance on a target and want to see domain name registration contact information. Which of the following is your best choice?


Options are :

  • IETF
  • IANA
  • CAPTCHA
  • Whois

Answer :Whois

CompTIA JK0-017 E2C Project+ Certification Practice Exam Set 1

In Amazon's EC2, virtual machines are provided and can be controlled through a service API. Which of the following best defines this service?


Options are :

  • Public
  • PaaS
  • SaaS
  • IaaS

Answer :IaaS

Which of the following laws protects the confidentiality and integrity of personal information collected by financial institutions?


Options are :

  • HIPAA
  • GLBA
  • Sarbanes-Oxley
  • PCI DSS

Answer :GLBA

A web application in your organization provides significant benefit to the accounting team. However, after a vulnerability scan and a risk assessment, it is determined the application presents significant risk if exposed to external attackers. The server hosting the application is moved inside the DMZ and strong access controls are put into place allowing only the accounting team to use it. Which of the following best describes the risk method used here?


Options are :

  • The organization is mitigating the risk.
  • The organization is avoiding the risk.
  • The organization is accepting the risk.
  • The organization is transferring the risk.

Answer :The organization is mitigating the risk.

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 7

An attacker sends SMS text messages crafted to appear as legitimate security notifications, with a phone number provided. The user unwittingly calls the number and provides sensitive data in response. Which of the following correctly describes this attack?


Options are :

  • Smishing
  • Phishing
  • Text attack
  • Vishing

Answer :Smishing

A team member advises that sometimes metadata in publicly available documents can provide valuable intelligence on a target. Which of the following tools can perform a metadata search for you?


Options are :

  • metagoofil
  • Google Matrix
  • netcat
  • nmap

Answer :metagoofil

You are offering your team's pen test services to a potential client. The customer reviews things and seems unconvinced a manual pen test will be helpful in securing their systems. Which of the following should you do as an ethical hacker and representative of your team?


Options are :

  • Bring statistical information to the table, showing the risks of poor network security as well as the use of pen testing by industry and government agencies alike.
  • Find a single security vulnerability and exploit it, thus proving pen testing is necessary.
  • Show pen test results from other assessments and explain the value those customers received.
  • Perform a partial pen test and show the customer what you've found with minimal effort.

Answer :Bring statistical information to the table, showing the risks of poor network security as well as the use of pen testing by industry and government agencies alike.

CT0-101 Convergence+ Certification Practice Exam Set 9

Which of the following provides specific services to untrusted networks or hosts?


Options are :

  • Packet-filtering firewall
  • Stateful firewall
  • Bastion host
  • Proxy firewall

Answer :Bastion host

In which phase of the Security Development Lifecycle is "fuzz" testing performed?


Options are :

  • Verification
  • Implementation
  • Release
  • Design

Answer :Verification

A user calls the help desk complaining about large amounts of unsolicited messages being received on her Bluetooth-enabled device. Which Bluetooth attack may be in play here?


Options are :

  • Bluesniffing
  • Bluejacking
  • Bluesmacking
  • Bluescarfing

Answer :Bluejacking

CompTIA Network+ (N10-007) 6 Practice Exams and Simulations Set 8

Which of the following is a legitimate use for tcp-over-dns?


Options are :

  • Firewall evasion
  • Packet crafting
  • OS fingerprinting
  • Network sniffing

Answer :Firewall evasion

An attacker sees guard dogs inside the perimeter. Which of the following best describes this control effort?


Options are :

  • Technical corrective control
  • Physical deterrent control
  • Physical detective control
  • Technical preventive control

Answer :Physical deterrent control

Which security standard was created by a council concerned with the protection of credit card data?


Options are :

  • OSSTMM
  • TCSEC
  • PCI DSS
  • HIPAA

Answer :PCI DSS

CompTIA Security+ (SY0-501) Practice Exams with Simulations Set 6

What is the primary difference between PGP and S/MIME?


Options are :

  • S/MIME can encrypt e-mail, but PGP can't.
  • PGP uses SHA-1 for integrity.
  • PGP can be used to encrypt hard drives, but S/MIME cannot.
  • S/MIME uses RSA for digital signatures.

Answer :PGP can be used to encrypt hard drives, but S/MIME cannot.

Which character is the best choice to start a SQL injection attempt?


Options are :

  • Single quote
  • Semicolon
  • Double quote
  • Colon

Answer :Single quote

Your team is testing a server that serves PHP pages for the Shellshock vulnerability. Which of the following actions should you take?


Options are :

  • Craft specific SQL entries to attack the vulnerability.
  • Modify the URL parameters.
  • Send specially created environment variables and trailing commands.
  • Create special HTML entries for web forms.

Answer :Send specially created environment variables and trailing commands.

CompTIA LX0-102 Linux Part 2 Certification Practice Exam Set 4

Which of the following statements is true regarding the use of a proxy server on your network?


Options are :

  • Proxy servers monitor unauthorized access to the network.
  • Proxy servers can filter Internet traffic for internal hosts.
  • Proxy servers allow outside customers access to the organization website.
  • Proxy servers automate IP addressing on your network.

Answer :Proxy servers can filter Internet traffic for internal hosts.

Which of the following refers to monitoring security configuration changes over time?


Options are :

  • Baselining
  • Change management
  • Patch management
  • Vulnerability management

Answer :Baselining

ICMP packets do not work in identifying targets on a particular subnet. Which of the following is the best option in this situation?


Options are :

  • Broadcast ping
  • TCP ping
  • Traceroute
  • Nslookup

Answer :TCP ping

FC0-U51 CompTIA IT Fundamentals Certification Exam Set 1

Which of the following nmap scans would be the least likely to be detectable?


Options are :

  • nmap -sO -PT -O -C5
  • nmap -sF -P0 -O
  • nmap -sF -PT -PI -O
  • nmap -sS -PT -PI -O -T1

Answer :nmap -sS -PT -PI -O -T1

An attacker calls the help desk and asks for a password reset on a user ID he has obtained information on. Which type of social engineering attack is this?


Options are :

  • Technical support
  • Reverse engineering
  • Spoofing
  • Impersonation

Answer :Technical support

You have network anomaly-based IPS set up, along with multiple other tools for security controls. This morning on the way to work, you receive an e-mail alert on your phone regarding possible malicious traffic. In investigating, you see that the IPS saw the anomalous traffic coming into the network and leaving, with the alert based on the unexpected behavior. The traffic turned out to be a user coming into work very early to get a project finished. Which of the following best describes what the IPS noted?


Options are :

  • True positive
  • True negative
  • False positive
  • False negative

Answer :False positive

JK0-019 CompTIA E2C Network + Certification Exam Set 11

You are performing tests from a Cisco device. Which of the following commands should be used to help identify a packet's path to its destination?


Options are :

  • ipconfig
  • ping
  • traceroute
  • tracert

Answer :traceroute

Background checks on employees, risk assessments on devices, and policies regarding key management and storage are examples of ___________ measures within physical security.


Options are :

  • operational
  • physical
  • technical
  • None of the answers are correct.

Answer :operational

Your organization leadership wants security to monitor all traffic coming into and out of your network for malicious intent. Which of the following should you implement?


Options are :

  • Proxy
  • Firewall
  • Network-based IDS
  • Host-based IDS

Answer :Network-based IDS

SY0-401 CompTIA Security+ Certification Practice Exam Set 7

A team member enters the following nmap command:nmap --script http-methods --script-args one.two.sample.comWhen the command executes, the following appears:PORT STATE SERVICE REASON80/tcp open http syn-ack| http-methods:|_ Supported Methods: GET PUT HEAD POST OPTIONS<output omitted>Based on the output, which HTTP methods will the script consider potentially risky?


Options are :

  • POST
  • HEAD
  • GET
  • PUT

Answer :PUT

Which of the following is a password-cracking tool?


Options are :

  • THC Hydra
  • PackETH
  • Hping
  • Wireshark

Answer :THC Hydra

This security assessment notifies the client of potential vulnerabilities but does not actually exploit them.


Options are :

  • None of the answers are correct.
  • Penetration test
  • Scanning assessment
  • Vulnerability assessment

Answer :Vulnerability assessment

CompTIA JK0-017 E2C Project+ Certification Practice Exam Set 10

An attacker installs malicious software on a Blackberry device without the user's knowledge, and then leverages the Blackberry as a proxy into the private network. Which of the following attacks matches this description?


Options are :

  • Bluesmacking
  • Bluejacking
  • Blackjacking
  • Blackscarfing

Answer :Blackjacking

Which of the following is an example of a logical control?


Options are :

  • Security tokens
  • Security policy
  • Guards
  • Fire alarms

Answer :Security tokens

In categorizing risk, which of the following refers to choosing not to use a technology or service due to the risk?


Options are :

  • Risk transfer
  • Risk avoidance
  • Risk acceptance
  • Risk mitigation

Answer :Risk avoidance

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions