Inspirational journeys

Follow the stories of academics and their research expeditions

Comptia Pentest+ 2023 Questions and answer - Part 27

Mary Smith

Tue, 21 Apr 2026

Comptia Pentest+ 2023 Questions and answer - Part 27

1. Which of the followings does not belong to Trojan deployment?

A) Trojan Construction Kit
B) Dropper
C) Wrapper
D) Sniffers



2. Sniffing is performed over ___________________.

A) Static Port
B) Dynamic Port
C) Promiscuous Port
D) Management Port



3. Sniffing without interfering is known as ___________________.

A) Active Sniffing
B) Passive Sniffing
C) Static Sniffing
D) Dynamic Sniffing



4. Which one of the following is the best option to defend against ARP poisoning?

A) Port Security
B) DHCP Snooping
C) DAI with DHCP Snooping
D) Port Security with DHCP Snooping



5. Which of the following Wireshark filters displays a packet from 10.0.0.1?

A) ip.addr =! 10.0.0.1
B) ip.addr ne 10.0.0.1
C) ip.addr == 10.0.0.1
D) ip.addr - 10.0.0.1



1. Right Answer: C
Explanation: Trojan Deployment includes the following steps: i. Create a Trojan using Trojan Construction Kit ii. Create a Dropper iii. Create a Wrapper iv. Propagate the Trojan v. Execute the Dropper

2. Right Answer: B
Explanation: In the process of Sniffing, attacker gets connected to the target network to sniff the packets. Using Sniffers, which turns the Network Interface Card (NIC) of the attacker's system into promiscuous mode, the attacker captures the packet. Promiscuous mode is a mode of the interface in which NIC responds for every packet it receives.

3. Right Answer: C
Explanation: Passive Sniffing is the sniffing type in which there is no need of sending additional packets or interfering the device such as Hub to receive packets. As we know, Hub broadcasts every packet to its ports, which helps the attacker to monitor all traffic passing through hub without any effort.

4. Right Answer: C
Explanation: DAI is used with DHCP snooping, IP-to-MAC bindings can be a track from DHCP transactions to protect against ARP poisoning (which is an attacker trying to get your traffic instead to your destination). DHCP snooping is required to build the MAC-to-IP bindings for DAI validation.

5. Right Answer: C
Explanation: Following are the filters of Wireshark to filter the output: Operator Function Example == Equal ip.addr == 192.168.1.1 Eq Equal tcp.port eq 23 != Not equal ip.addr != 192.168.1.1 Ne Not equal it.src ne 192.168.1.1 contains Contains specified value http contains 'http://www.ipspecialist.net'

0 Comments

Leave a comment