All Posts

Comptia Pentest+ 2023 Questions and answer - Part 20

Mary Mary Smith
03 Mar 2023
2 min
0

1. Which one of the following is a technique used in attacking wireless access points or the devices connected to them that forces client devices to disconnect from a network temporarily?

A) Downgrade Attack
B) Fragmentation Attack
C) ChopChop Attack
D) De Authentication Attack Exploited



2. WPS weakness enables attackers to brute-force the PIN used to obtain a WPA password, Select the tool is used specifically for this purpose?

A) Reaver
B) Airodump-ng
C) WiFite
D) Kismet



3. By which of the following attack the duplication of access cards is enabled for penetration tester when the card is of a particular value during physical penetration tests?

A) Tailgating
B) RFID Cloning
C) Bluejacking
D) Fragmentation Attack



4. A DoS method is specifically used to target wireless communication protocols; what is that attack called?

A) Packet Injection
B) Karma Attack
C) Jamming
D) Evil Twin



5. Kaiden would like to perform an automated web application security scan of a new system before it is moved into production. Which one of the following tools is best suited for this task?

A) Wireshark
B) CeWL
C) Nmap
D) Nikto



1. Right Answer: D
Explanation: A De Authentication attack is a technique used in attacking wireless access points or the devices connected to them that forces client devices to disconnect from a network temporarily.

2. Right Answer: A
Explanation: The tool is Reaver. Only 11,000 guesses are necessary to identify the PIN used by a given WPS-enabled network, this is just because of the weakness in the implementation of WPS allowing an attacker to recover a WPA password in a number of hours.

3. Right Answer: B
Explanation: RFID access cards are copied using a technique by RFID cloning. In corporate facilities and offices, cards are the typical means of authorization checks and while conducting a physical penetration test, they are a particularly valuable technique.

4. Right Answer: C
Explanation: A DoS attack against wireless access points or even cellular signals, is described by using Jamming. Signal jamming is illegal in many countries and jurisdictions. Wireless APs, Cell phone networks, satellite, and other radio communication frequencies make up what is broadly referred to as the EM (Electro Magnetic) spectrum. Many nations treat the EM spectrum as a national resource, the same as their water or airspace, and these countries take great care to ensure it is protected.

5. Right Answer: D
Explanation: Nikto is the best tool as it is a dedicated web application scanning tool. Nmap is a port scanner, while Wireshark is a packet analysis tool.

0 Comments
Leave a comment