Inspirational journeys

Follow the stories of academics and their research expeditions

Comptia Pentest+ 2023 Questions and answer - Part 46

Mary Smith

Tue, 21 Apr 2026

Comptia Pentest+ 2023 Questions and answer - Part 46

1. Select the suitable tools that are used to consider the files produced by several packet-capture programs such as WinDump, Wireshark, tcpdump, and EtherPeek?

A) Tcptraceroute
B) Tcptrace
C) Nessus
D) OpenVAS



2. An attacker using a rogue wireless AP, launches an MITM attack and injects an HTML code to embed a malicious applet in all HTTP connections. When users access any page, the applet runs and exploits many machines. Select the suitable tool that the hacker probably used to inject the HTML code.

A) Ettercap
B) Wireshark
C) Aircrack-ng
D) Tcpdump



3. Which tool can be used for passive OS fingerprinting?

A) Nmap
B) Tcpdump
C) Ping
D) Tracert



4. From the following, select a tool that can scan a network to execute vulnerability checks and compliance auditing.

A) NMAP
B) Nessus
C) BeFF
D) Metasploit



5. Challenge/response authentication is used to prevent ________________.

A) Scanning Attacks
B) Replay Attacks
C) Password Cracking Attacks
D) Session Hijacking Attacks



1. Right Answer: A
Explanation: TCPtrace is a tool used for analysis of TCP dump files. It is compatible with the files produced by several popular packet-capture programs, including WinDump/tcpdump/Wireshark, EtherPeek, snoop, and Agilent NetMetrix.

2. Right Answer: A
Explanation: Ettercap is a comprehensive suite for man-in-the-middle attack, helpful for sniffing time connection, content filtering, active and passive dissection of many protocols and it includes many features for network and host analysis.

3. Right Answer: D
Explanation: Nmap -P can scan single port, range of ports or all 65535 ports.

4. Right Answer: B
Explanation: Metasploit is a penetration testing system that makes hacking way easier than it used to be. It is an essential tool for many attackers and defenders. Point Metasploit at your target, pick an exploit, whatever payload to drop, and hit -Enter.

5. Right Answer: C
Explanation: Challenge Handshake Authentication Protocol (CHAP) secures against replay attack during the authentication phase through the use of an incrementally changing identifier and a variable challenge value.

0 Comments

Leave a comment