Inspirational journeys

Follow the stories of academics and their research expeditions

Comptia Pentest+ 2023 Questions and answer - Part 41

Mary Smith

Tue, 21 Apr 2026

Comptia Pentest+ 2023 Questions and answer - Part 41

1. Which encryption protocol is considered a broken encryption algorithm and was a part of the original standard for 802.11 wireless communications?

A) WEP
B) WPA-Enterprise
C) ARP
D) WPA



2. HIDS is deployed to monitor activities on the _____________.

A) Network Device
B) Application
C) Outbound Traffic
D) Host



3. An attacker is attempting trial and error method to access restricted directories using dots and slash sequences. Which type of web server attack is this?

A) LDAP Attack
B) AD Attack
C) Directory Traversal Attack
D) SQL Injection



4. An individual who is responsible for the management and configuration required for the web application is called ______________________.

A) Server Administrator
B) Network Administrator
C) Application Administrator
D) DC Administrator



5. An attacker has accessed the web application. Now, he is escalating privileges to access sensitive information. Which type of web application attack is this?

A) The Attack on the Authentication Mechanism
B) Authorization Attack
C) Session Management Attack
D) Injection Attack



1. Right Answer: A
Explanation: De-escalation is the need to communicate with the client for eliminating issues and crises that arise during a penetration test.

2. Right Answer: C
Explanation: The protocol WEP, Wired Equivalent Protocol, was part of the original wireless communication standard;802.11, but now it is considered as a broken encryption algorithm.

3. Right Answer: C
Explanation: In this type of attack, the attacker attempts using trial and error method to access restricted directories using dots and slash sequences. By accessing the directories outside the root directory, the attacker reveals sensitive information about the system.

4. Right Answer: B
Explanation: Application Administrator is responsible for the management and configuration required for the web application. It ensures the availability and high performance of the web application.

5. Right Answer: B
Explanation: An attacker accessing the web application by using low privilege account, escalates the privileges to access sensitive information. Different techniques are used such as URL, POST data, Query string, cookies, parameter tampering, HTTP header, et to escalate privileges.

0 Comments

Leave a comment