All Posts

Comptia Pentest+ 2023 Questions and answer - Part 42

Mary Mary Smith
03 Mar 2023
2 min
0

1. Inferential Injection is also called _____________________.

A) Union SQL Injection
B) Blind Injection
C) Error-based SQL Injection
D) In-band SQL Injection



2. An attacker is using the same communication channel to launch the injection attack and to gather information from the response. Which type of SQL injection is being performed?

A) In-band SQL Injection
B) Inferential SQL Injection
C) Out-of-band SQL Injection
D) Union-based SQL Injection



3. What does SQL stand for?

A) Structured Question Language
B) Structured Query Language
C) Strong Question Language
D) Strong Query Language



4. Which of the following tools is appropriate for packet sniffing in a wireless network?

A) Airsnort with AirPcap
B) Wireshark with WinPcap
C) Wireshark with AirPcap
D) Ethereal with WinPcap



5. How many layers are there in an architecture of IoT?

A) 4
B) 5
C) 6
D) 7



1. Right Answer: A
Explanation: In an Inferential SQL Injection, no data is transferred from a Web application, i.e., the attacker is unable to see the result of an attack hence it is referred as a Blind Injection.

2. Right Answer: B
Explanation: In-Band SQL injection is a category, which includes injection techniques using same communication channel to launch the injection attack and gather information from the response.

3. Right Answer: C
Explanation:

4. Right Answer: B
Explanation: AirPcap is a Windows-based 802.11 Wireless Traffic capture device that fully integrates with Wireshark. It delivers information about wireless protocols and radio signals, enabling the capture and analysis of low-level 802.11 wireless traffic that includes control frames, management frames, and power information in the Wireshark UI. Once AirPcap is installed, Wireshark displays a special toolbar that provides direct control of the AirPcap adapter during wireless data capture.

5. Right Answer: A
Explanation: The architecture of IoT depends upon five layers, which are as follows: I. Application Layer II. Middleware Layer III. Internet Layer IV. Access Gateway Layer V. Edge Technology Layer

0 Comments
Leave a comment