Search Header Logo

Pentest+ Post Training Assesment

Authored by gopi venketesan

Other

Professional Development

Used 6+ times

Pentest+ Post Training Assesment
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A penetration tester received a .pcap file to look for credentials to use in an engagement. Which of the following tools should the tester utilize to open and read the .pcap file?

wireshark

metasploit

nmap

netcat

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A penetration tester was able to gather MD5 hashes from a server and crack the hashes easily with rainbow tables. Which of the following should be included as a recommendation in the remediation report?

Stronger algorithmic requirements.

Access controls on the server.

Encryption on the user passwords.

A patch management program.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A penetration tester has been hired to perform a physical penetration test to gain access to a secure room within a client’s building. Exterior reconnaissance identifies two entrances, a WiFi guest network, and multiple security cameras connected to the Internet. Which of the following tools or techniques would BEST support additional reconnaissance?

wardriving

shodan

recon-ng

aircrack-ng

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A penetration tester completed a vulnerability scan against a web server and identified a single but severe vulnerability. Which of the following is the BEST way to ensure this is a true positive?

Run another scanner to compare.

Perform a manual test on the server.

Check the results on the scanner.

Look for the vulnerability online.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company has hired a penetration tester to deploy and set up a rogue access point on the network. Which of the following is the BEST tool to use to accomplish this goal?

wireshark

Aircrack-ng

kismet

wifite

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A penetration tester recently performed a social-engineering attack in which the tester found an employee of the target company at a local coffee shop and over time built a relationship with the employee. On the employee’s birthday, the tester gave the employee an external hard drive as a gift. Which of the following social-engineering attacks was the tester utilizing?

Phishing

Tailgating

Baiting

Shoulder Surfing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security company has been contracted to perform a scoped insider-threat assessment to try to gain access to the human resources server that houses PII and salary data. The penetration testers have been given an internal network starting position. Which of the following actions, if performed, would be ethical within the scope of the assessment?

Exploiting a configuration weakness in the SQL database.

Intercepting outbound TLS traffic.

Gaining access to hosts by injecting malware into the enterprise-wide update server.

Leveraging a vulnerability on the internal CA to issue fraudulent client certificates.

Establishing and maintaining persistence on the domain controller.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?