All Posts

Comptia Pentest+ 2023 Questions and answer - Part 18

Mary Mary Smith
03 Mar 2023
2 min
0

1. Which of the following is not a type of vulnerability assessment?

A) Active
B) Passive
C) External
D) Restricted



2. Which of the following is not a common technique to complete an attack?

A) Cross Compiling Code
B) Brute Forcing Attack
C) Exploit Modification
D) Embedded System



3. Following are the types of human-based social engineering, except ___________.

A) Impersonation
B) Shoulder Surfing
C) Dumpster Diving
D) Phishing



4. Select the technique which cracks the application password using dictionary file:

A) Deception Attack
B) Dictionary Attack
C) Exploit Chaining
D) Brute Forcing Attack



5. ________ is the technique in which an unauthorized person waits for an authorized person to gain entry in a restricted are

A) Tailgating
B) Dumpster Diving
C) Piggybacking
D) Impersonation



1. Right Answer: D
Explanation: There are different types of vulnerability assessment such as: Active Assessment Passive Assessment Internal Assessment External Assessment

2. Right Answer: D
Explanation: Embedded system is not a common technique to complete attack, it is an integrated system and dedicated computer, including both hardware and software.

3. Right Answer: D
Explanation: Phishing is not a type of human-based social engineering. It is a technique in which a fake email that looks like an authentic email is sent to a target host.

4. Right Answer: B
Explanation: Dictionary Attack is used to perform password cracking; a password cracking application is used along with a dictionary file.

5. Right Answer: C
Explanation: Piggybacking is the technique in which an unauthorized person waits for an authorized person to gain entry in a restricted are

0 Comments
Leave a comment