Inspirational journeys

Follow the stories of academics and their research expeditions

Comptia Pentest+ 2023 Questions and answer - Part 28

Mary Smith

Tue, 21 Apr 2026

Comptia Pentest+ 2023 Questions and answer - Part 28

1. A phishing attack is performed over ____________________.

A) Messages
B) Phone Calls
C) E-mails
D) File Sharing



2. Basic Purpose of Social Engineering attacks are ________________.

A) Stealing information from humans
B) Stealing information from Network Devices
C) Stealing information from compromised Social Networking sites
D) Compromising social accounts



3. Which of the following is not a type of Human-based Social Engineering?

A) Impersonation
B) Reverse Social Engineering
C) Piggybacking & Tailgating
D) Phishing



4. Attack performed by a disgruntled employee of an organization is called ________.

A) Insiders Attack
B) Internal Attack
C) Vulnerability
D) Loophole



5. To defend against a phishing attack, a necessary step is ____________________.

A) Spam Filtering
B) Traffic Monitoring
C) E-mail Tracking
D) Education & Training



1. Right Answer: A
Explanation: Phishing process is a technique in which Fake E-mail, which looks like legitimate E-mail, is sent to a target host. When the recipient opens the link, he is enticed to provide information.

2. Right Answer: D
Explanation: Social Engineering is an act of stealing information from humans. As it does not have any interaction with target system or network, it is considered as a non-technical attack.

3. Right Answer: A
Explanation: Human-based Social Engineering includes one-to-one interaction with the target. Social Engineer gathers sensitive information by tricking the users; for example, ensuring the trust, taking advantage of habits, behavior and moral obligation.

4. Right Answer: A
Explanation: Insider attack includes attacks performed by an employee of an organization, who has been paid for it to do so by the competitor or attacker, or a disgruntled employee.

5. Right Answer: B
Explanation: Spam filtering is a necessary step to avoid phishing email, which reduces the threat of unintentionally clicking on spam emails.

0 Comments

Leave a comment