All Posts

Comptia Pentest+ 2023 Questions and answer - Part 25

Mary Mary Smith
03 Mar 2023
2 min
0

1. Which of the followings is correct about SNMP?

A) SNMP v1 does not support encryption
B) SNMP v1 & v2c do not support encryption
C) SNMP does not support encryption
D) All SNMP versions support encryption



2. A user Bob is cracking a password by using the list of known and common phrases until the password is accepte Which type of attack is this?

A) Brute Force Attack
B) Default Password
C) Dictionary Attack
D) Password Guessing



3. An attacker is cracking the password by trying every possible combination of alpha-numeric characters. Which one of the following type of Password Cracking is this?

A) Brute Force Attack
B) Default Password
C) Dictionary Attack
D) Password Guessing



4. Which of the following is a framework that can perform automated attacks on services, applications, port & unpatched software?

A) Wireshark
B) Maltego
C) Metasploit
D) Syhunt Hybrid



5. Cracking password with pre-computed hashes is called _____________.

A) Rainbow Table Attack
B) Brute Force Attack
C) Dictionary Attack
D) Password Guessing



1. Right Answer: B
Explanation: There is no support for encryption in version 1 & 2 SNMPv3 supports both encryption (DES) and hashing (MD5 or SHA).

2. Right Answer: A
Explanation: In the dictionary attack to perform password cracking, a password cracking application is used along with a dictionary file. This dictionary file contains entire dictionary or list of known & common words to attempt password recovery. This is the simplest type of password cracking, and usually, systems are not vulnerable to dictionary attacks if they use strong, unique and alphanumeric passwords.

3. Right Answer: C
Explanation: Brute Force attack attempts to recover the password by trying every possible combination of characters. Each combination pattern is attempted until the password is accepte Brute forcing is a common, and basic technique to uncover passwor

4. Right Answer: A
Explanation: Metasploit Framework enables you to automate the process of discovery and exploitation and provides you with the necessary tools to perform the manual testing phase of a penetration test. You can use Metasploit Pro to scan for open ports and services, exploit vulnerabilities, pivot further into a network, collect evidence, and create a report of the test results.

5. Right Answer: C
Explanation: Every possible combination of character is computed for the hash to create a rainbow table. When a rainbow table contains all possible pre-computed hashes, an attacker may capture the password hash of target and compare it with the rainbow table.

0 Comments
Leave a comment