Inspirational journeys

Follow the stories of academics and their research expeditions

Comptia Pentest+ 2023 Questions and answer - Part 48

Mary Smith

Tue, 21 Apr 2026

Comptia Pentest+ 2023 Questions and answer - Part 48

1. A pentester is configuring a Windows laptop for a test. While setting Wireshark, which of the following driver and library is required to allow the NIC to work in promiscuous mode?

A) Winpcap
B) Winprom
C) Libpcap
D) Awinpcap



2. While scanning your company-s network, you discover that TCP port 123 is open. Which of the services by default run on TCP port 123?

A) POP3
B) Telnet
C) DNS
D) Network Time Protocol



3. Which of the following tools should be used to collect Wireless Packet Data?

A) John the Ripper
B) NetStumbler
C) Nessus
D) Netcat



4. Define the Denial-of-Service attack.

A) A hacker uses every character, word, or letter that he or she can think of bypassing authentication
B) A hacker tries to decipher a password by using a system, which subsequently crashes the network
C) A hacker prevents a legitimate user (or groups of users) from accessing a service
D) A hacker attempts to imitate a legitimate user by confusing a computer or even another person



5. Which of the followings is an example of two factor authentication?

A) Username and Password
B) PIN Number and Birth date
C) Digital Certificate and Hardware Token
D) Fingerprint and Smartcard ID



1. Right Answer: D
Explanation: Npcap and Winpcap are window versions of the libpcap library. They are used to capture line network traffic on windows. Wireshark includes Winpcap, however Npcap is recommended for window 10.

2. Right Answer: B
Explanation: By default, TCP and UDP port 123 is used for Network Time Protocol (NTP)

3. Right Answer: C
Explanation: NetStumbler is a tool for Windows that facilitates detection of Wireless LANs using 802.11b, 802.11a and 802.11g WLAN standards. It runs on Microsoft Windows Operating Systems from Windows 2000 to Windows XP.

4. Right Answer: D
Explanation: Denial-of-Service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfille

5. Right Answer: B
Explanation: Fingerprint and Smartcard ID are the examples of two factor authentication.

0 Comments

Leave a comment