adplus-dvertising

Welcome to the Exploiting Network Vulnerabilities MCQs Page

Dive deep into the fascinating world of Exploiting Network Vulnerabilities with our comprehensive set of Multiple-Choice Questions (MCQs). This page is dedicated to exploring the fundamental concepts and intricacies of Exploiting Network Vulnerabilities, a crucial aspect of CompTIA PenTest+ Certification Exam PT0 002. In this section, you will encounter a diverse range of MCQs that cover various aspects of Exploiting Network Vulnerabilities, from the basic principles to advanced topics. Each question is thoughtfully crafted to challenge your knowledge and deepen your understanding of this critical subcategory within CompTIA PenTest+ Certification Exam PT0 002.

frame-decoration

Check out the MCQs below to embark on an enriching journey through Exploiting Network Vulnerabilities. Test your knowledge, expand your horizons, and solidify your grasp on this vital area of CompTIA PenTest+ Certification Exam PT0 002.

Note: Each MCQ comes with multiple answer choices. Select the most appropriate option and test your understanding of Exploiting Network Vulnerabilities. You can click on an option to test your knowledge before viewing the solution for a MCQ. Happy learning!

Exploiting Network Vulnerabilities MCQs | Page 12 of 13

Explore more Topics under CompTIA PenTest+ Certification Exam PT0 002

Q111.
What attack technique can allow the pentester visibility into traffic on VLANs other than their native VLAN?
Discuss
Answer: (d).Switch spoofing Explanation:Switch spoofing relies on a switch interface that is configured as either dynamic desirable, dynamic auto, or trunk mode, allowing an attacker to generate dynamic trunk protocol messages. The attacker can then access traffic from all VLANs.
Q112.
What type of Bluetooth attack attempts to send unsolicited messages via Bluetooth devices?
Discuss
Answer: (c).Bluejacking Explanation:Bluejacking is an attack technique that attempts to send unsolicited messages via Bluetooth. Bluesnarfing attempts to steal information, whereas bluesniping is a term for long-distance Bluetooth attacks. Bluesending is not a common term used for Bluetooth attacks as of this writing.
Q113.
Cassandra wants to attack a WPS-enabled system. What attack technique can she use against it?
Discuss
Answer: (b).Pixie dust Explanation:Pixie dust attacks use brute force to identify the key for vulnerable WPS-enabled routers due to poor key selection practices. The other options are made up.
Q114.
Michelle wants to capture NFC communications as part of a penetration test. What is the most critical factor in her ability to intercept the communication?
Discuss
Answer: (c).Range Explanation:NFC communications occur at a very short range that allows a "tap" to occur. That means that Michelle will need to put a capture device very close to the communications or that she needs specialized capabilities to try to capture the traffic at longer distances. Encryption can make it difficult to read the traffic, but it won't stop interception. Duration of the transmission and protocol version could potentially add complexity, but the key thing to remember is that NFC is a very short-ranged protocol.
Q115.
As part of a penetration test Mariana uses a tool that uses the same username and password from a list on many target systems and then uses the next username and password from its list. Which of the following terms best describes the attack she is using?
Discuss
Answer: (d).Password spraying Explanation:Mariana is conducting a password spraying attack. Password spraying attacks use the same credentials against many systems, then try the next credential pairing. Hash cracking attempts to identify the original password that resulted in a given captured hash. Dictionary attacks use a word list along with a set of rules to modify those words to attempt a brute-force attack. A brute-force attack involves repeated tries using an algorithm or process to attempt to log in. When a question like this has multiple potentially correct answers, remember to answer with the most specific answer rather than a broad answer.
Q116.
Steve has set his penetration testing workstation up for an on-path attack between his target and an FTP server. What is the best method for him to acquire FTP credentials?
Discuss
Answer: (a).Capture traffic with Wireshark. Explanation:FTP is an unencrypted protocol, which means that Steve can simply capture FTP traffic the next time a user logs into the FTP server from the target system. A brute-force attack may succeed, but it’s more likely to be noticed. Although an exploit may exist, the question does not mention it, and even if it does exist it will not necessarily provide credentials. Finally, downgrade attacks are not useful against FTP servers.
Q117.
Ian wants to drop a tool on a compromised system that will allow him to set up a reverse shell. Which of the following tools should he select?
Discuss
Answer: (c).Netcat Explanation:Netcat is the only tool from this list that can be used as a reverse shell. It can also be used for basic port scanning and a variety of other network attacks and testing purposes. Aircrack-ng is used for network penetration testing, nmap is a port scanner, and Censys is a search engine that can be used for open-source intelligence work.
Q118.
What drives the use of deauthentication attacks during penetration tests?
Discuss
Answer: (a).The desire to capture handshakes Explanation:Deauthenticating a system will result in reauthentication, creating the possibility of capturing handshakes from a target. Bluejacking, network stress testing, and RFID cloning attacks do not rely on deauthentication.
Q119.
Which of the following tools will not allow Alice to capture NTLM v2 hashes over the wire for use in a pass-the-hash attack?
Discuss
Answer: (b).Mimikatz Explanation:Unlike the other options listed here, Mimikatz pulls hashes from the Local Security Authority Subsystem Service (LSASS) process. Since the question specifically notes "over the wire," Mimikatz is the only tool that cannot be used for that.
Q120.
For what type of activity would you use the tools HULK, LOIC, HOIC, and SlowLoris?
Discuss
Answer: (c).DoS Explanation:All of these tools are denial-of-service tools. Although some of them have been used for DDoS attacks, they are not DDoS tools on their own.

Suggested Topics

Are you eager to expand your knowledge beyond CompTIA PenTest+ Certification Exam PT0 002? We've curated a selection of related categories that you might find intriguing.

Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!