Question
a.
Because it resolves via LLMNR queries
b.
Because it resolves via DNS queries
c.
Because it sends broadcast queries to the local subnet
d.
Because it is a stand-alone exploit
Posted under CompTIA PenTest+ Certification Exam PT0 002
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Why is targeting the NetBIOS name service considered an effective attack?
Similar Questions
Discover Related MCQs
Q. How can captured hashes from SMB spoofing be reused for pass-the-hash–style attacks?
View solution
Q. How can Responder be used in exploiting NetBIOS and LLMNR responses?
View solution
Q. What does Responder automatically capture when it sees an authentication attempt?
View solution
Q. What functionality built into the Responder tool allows the gathering of more credentials and hashes after gaining access to a remote system?
View solution
Q. What is a popular target for penetration testers in Windows systems, and what vulnerability is often exploited in unpatched systems?
View solution
Q. What does the Metasploit tool include to target the EternalBlue vulnerability in the Windows SMB server?
View solution
Q. Which services does the PenTest+ exam specifically ask test-takers to be familiar with in terms of exploits?
View solution
Q. What is the primary purpose of Nmap in the context of network attacks?
View solution
Q. Which tool is often called a network Swiss army knife and can be used for purposes such as port scanning and creating a reverse shell?
View solution
Q. What port does SNMP commonly operate on?
View solution
Q. What is one of the first steps for SNMP exploitation?
View solution
Q. Which version of SNMP is functionally equivalent to SNMP v2 but adds additional security capabilities to provide confidentiality, integrity, and authentication?
View solution
Q. What protocol is commonly used for sending emails, operates on TCP port 25, and can be easily identified by telnetting to the service port?
View solution
Q. Which command can be used for information gathering on an SMTP server by connecting to it and using the EXPN and VRFY commands?
View solution
Q. Which protocol has been around since 1971, remains a plaintext, unencrypted protocol operating on TCP port 21, and can be exploited by capturing usernames and passwords on the wire?
View solution
Q. What is one potential avenue for FTP service exploitation?
View solution
Q. What is Kerberoasting?
View solution
Q. Why is Kerberoasting most effective against shorter, less complex passwords?
View solution
Q. What is the purpose of the Kerberoasting toolkit?
View solution
Q. How many steps are involved in the Kerberoasting process?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond CompTIA PenTest+ Certification Exam PT0 002? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!