Inspirational journeys

Follow the stories of academics and their research expeditions

Comptia Pentest+ 2023 Questions and answer - Part 31

Mary Smith

Tue, 21 Apr 2026

Comptia Pentest+ 2023 Questions and answer - Part 31

1. Session Fixation is vulnerable to _______________.

A) Web Applications
B) TCP Communication
C) UDP Communication
D) Software



2. For which of the following findings in a penetration test, the best recommended mitigation technique for encryption at rest and in transit?

A) SQL Injection
B) Single-factor Authentication
C) Shared Local Administrator Credentials
D) Passwords Stored in Plaintext



3. After a low-privilege shell on a target server is obtained and work on privilege escalation is commenced, a netcat process running on an unprivileged port returning a /bin/bash instance to an IP address is identified not being a part of any address block used by either the client or your penetration testing organization. The appropriate action to be taken in this case is _______________________.

A) When writing the penetration test report, take screenshots to serve as a finding
B) When an emergency meeting with the client is called out, halt the testing immediately
C) Begin OSINT collection on the IP address in question to begin identifying the remote end
D) Close the process once it escalates to the root and ignore it, as it was perhaps a residue from a previous penetration test



4. Which of the following findings make an organization-s security posture weak by increasing its viable attack surface without a business need?

A) Single-factor Authentication
B) SQL Injection
C) Unnecessary Open Services
D) Passwords Stored in Plaintext



5. What type of finding is mitigated by preventing users from choosing passwords found in common dictionary files and enforcing minimum password requirements?

A) SQL Injection
B) Weak Password Complexity
C) Passwords Stored in Plaintext
D) Shared Local Administrator Credentials



1. Right Answer: D
Explanation: To understand the Session Fixation attack better, let-s consider a scenario where there is an attacker, a victim, and the web server. Attacker initiates a legitimate connection with the web server and issues a session ID or uses a new session I The attacker then sends the link to the victim with the established session ID for bypassing the authentication. When the user clicks the link and attempts to log into the website, web server continues the session as it is already established and authentication is performe

2. Right Answer: D
Explanation: Host-based IPS/IDS is normally deployed for the protection of specific host machine, and it works closely with the Operating System Kernel of the host machine.

3. Right Answer: B
Explanation: The best recommended mitigation strategy for passwords being stored in plaintext is encryption. An organization-s security posture is weakened by storing passwords in plaintext through both simplification of lateral movement for a theoretical adversary and elimination of the concept of non-repudiation and verification of individuals responsible for actions under a given username.

4. Right Answer: C
Explanation: The identification of a running reverse shell , or the discovery of any other evidence of a previous breach of a target network grounds to notify the client and immediately halt testing. Staying in your lane is important when conducting a penetration test; It is a forensics task to identify the culprit of a security breach, a forensic analysis performing tools and knowledge is markedly distinct from those used in penetration testing.

5. Right Answer: B
Explanation: An organization-s security posture is weakened by unnecessary open services. The viable attack surface is increased without a business need; encouraging hardening of the target system mitigates this finding in the best way possible.

0 Comments

Leave a comment