Home β€Ί Blog β€Ί CompTIA

Comptia Pentest+ 2023 Questions and answer - Part 16

Mary Mary Smith
03 Mar 2023
2 min read
0 views
0 Comments
2 min read
349 words

1. Following are the art of packet crafting, except ______________.

A) Packet Assembly
B) Packet Inspection
C) Packet Decoding
D) Packet Editing



2. Which of the following is not an advantage of Packet Inspection?

A) It does not support strong user authentication
B) Filter and analyze messages
C) Open and close ports
D) Perform in-line spam screening



3. Select the technique used to identify the information of operating system running on a target machine.

A) Eavesdropping
B) Decompilation
C) Debugging
D) OS Fingerprinting



4. Which of the following statement is a technique of encrypting a clear text data into a scrambled code?

A) Cryptography
B) Symmetric Cryptography
C) Asymmetric Cryptography
D) None of the above



5. The act of intercepting communication among two points is called ________.

A) Decompilation
B) Eavesdropping
C) Debugging
D) None of the above



1. Right Answer: B
Explanation: The art of packet crafting can be divided into four phases such as: Packet Assembly Packet Editing Packet Play Packet Decoding

2. Right Answer: A
Explanation: There are many benefits of Packet Inspection because it can help you to stay more secure. It commonly allows you to: Filter and analyze messages Open and close ports Perform in-line spam screening Eliminate attacks against the BIOS Proxy your IM traffic Perform SSL session inspections Ward off Secure Socket Layer sniffing

3. Right Answer: D
Explanation: OS Fingerprinting is a technique used to identify the information of Operating System running on a target machine.

4. Right Answer: A
Explanation: Cryptography is a technique of encrypting the clear text data into a scrambled code.

5. Right Answer: B
Explanation: The act of intercepting communications among two points is called Eavesdropping. Eavesdropping is used to sniff and record packets of data communications from a network and then subsequently listen or read by using cryptographic tools for decryption and analysis.

Mary
Written by
Comments
0