All Posts

Comptia Pentest+ 2023 Questions and answer - Part 22

Mary Mary Smith
03 Mar 2023
2 min
0

1. Which server anonymizes the web traffic to provide anonymity?

A) Proxy Server
B) Web Server
C) Application
D) DNS Server



2. Which of the following tools is capable of performing a customized scan?

A) Nmap
B) Wireshark
C) Netcraft
D) Airpcap



3. Method of pinging a range of IP address is called ______________.

A) Ping
B) Ping Sweep
C) Hping
D) SSDP Scanning



4. What is true about enumeration?

A) In the phase of enumeration, an attacker initiates active connections with the target system to extract more information
B) In the phase of enumeration, an attacker collects information about target using Social Engineering
C) In the phase of enumeration, an attacker collects information about target using the passive connection
D) In the phase of enumeration, an attacker collects information about target using scanning



5. NetBIOS is basically ________________.

A) Input / Output System program
B) Networking System
C) Operating System
D) Graphics Program



1. Right Answer: A
Explanation: Proxy server anonymizes the web traffic to provide anonymity. When a user sends a request for any resources to the other publically available servers, proxy server acts as an intermediary for these requests.

2. Right Answer: B
Explanation: NMAP in a nutshell, offers Host discovery, Port discovery, Service discovery, Operating System version information, Hardware (MAC) address information, Service version detection, Vulnerability & exploit detection using NMAP Scripts (NSE).

3. Right Answer: A
Explanation: Ping Sweep is a method of sending ICMP Echo Request packets to a range of IP addresses instead of sending one by one requests and observing the response.

4. Right Answer: A
Explanation: In the phase of Enumeration, an attacker initiates active connections with the target system. Using this active connection, direct queries are generated to gain more information. This information helps to identify the system attack points. Once attacker discovers attack points, it can gain unauthorized access using this collected information to reach assets.

5. Right Answer: D
Explanation: NetBIOS is Network Basic Input / Output System program that allows the communication in between different applications running on different systems within a local area network.

0 Comments
Leave a comment