• Complain

Karamagi - CompTIA Pentest+ (Practice Exams)

Here you can read online Karamagi - CompTIA Pentest+ (Practice Exams) full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover

CompTIA Pentest+ (Practice Exams): summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "CompTIA Pentest+ (Practice Exams)" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Karamagi: author's other books


Who wrote CompTIA Pentest+ (Practice Exams)? Find out the surname, the name of the author of the book and a list of all author's works by series.

CompTIA Pentest+ (Practice Exams) — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "CompTIA Pentest+ (Practice Exams)" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Practice Exam 1
1. You have been asked to perform a penetration test for a medium-sized organization that sells after-market motorcycle parts online. What is the first task you should complete?
A. Research the organizations product offerings.
B. Determine the budget available for the test.
C. Identify the scope of the test.
D. Gain authorization to perform the test.
2. A consultant has been hired to perform a penetration test for an organization. The target of the test is the organizations proprietary design documents. The aim is to circumvent security measures and gain unauthorized access to these documents. What type of assessment is being conducted in this scenario?
A. Objective-based assessment
B. Goal-based assessment
C. Compliance-based assessment
D. Red team assessment
3. A consultant has been hired to perform a penetration test for an organization in the healthcare industry. The target of the test is a public-facing self-service website that users can access to view their health records. The aim is to circumvent security measures and gain unauthorized access to this information. What type of assessment is being conducted in this scenario?
A. Objective-based assessment
B. Gray box assessment
C. Compliance-based assessment
D. White box assessment
4. A consultant has been hired to perform a penetration test for an organization in the healthcare industry. The target of the test is a public-facing self-service website that users can access to view their health records. The penetration tester has been given full knowledge of the organizations underlying network. What type of test is being conducted in this example?
A. Goal-based assessment
B. Black box assessment
C. Objective-based assessment
D. White box assessment
5. In which type of penetration test does the tester have a limited amount of information about the target environment but is not granted full access?
A. Gray box assessment
B. Black box assessment
C. Compliance-based assessment
D. White box assessment
6. You have been asked to perform a black box penetration test for a medium-sized organization that sells imported motorcycles and ATVs online. In which phase of this assessment will you likely spend most of your time?
A. Planning and scoping
B. Information gathering and vulnerability identification
C. Attacking and exploiting
D. Reporting and communicating results
7. You are performing a black box penetration test for a medium-sized organization that sells imported motorcycles and ATVs through its online storefront. You need to discover who owns the organizations domain. Which tool in your penetration testing toolkit should you use?
A. nslookup
B. whois
C. Shodan
D. Maltego
8. You are performing a black box penetration test for a medium-sized organization that sells imported clothing through its online storefront. You need to discover which IP addresses are associated with the organizations domain. Which tool in your penetration testing toolkit should you use?
A. nslookup
B. whois
C. theHarvester
D. Fingerprinting Organizations with Collected Archives (FOCA)
9. You are performing a black box penetration test for a medium-sized organization that sells imported clothing through its online storefront. You want to query search engines and other resources to discover email addresses, employee names, and other details about the target. Which tool in your penetration testing toolkit should you use?
A. nmap
B. Shodan
C. theHarvester
D. Fingerprinting Organizations with Collected Archives (FOCA)
10. You are performing a black box penetration test for a large organization that wholesales imported electronic devices in the United States. You need to uncover any information you can find about the organization using open source intelligence (OSINT). Which tool in your penetration testing toolkit could you use to do this?
A. Censys
B. whois
C. recon-ng
D. Shodan
E. All of the above
11. You are conducting a black box penetration test for a client. You have used reconnaissance tools to create a list of employee email addresses within the target organization. You craft an email addressed to all of the employees warning them that they must change their password within 24 hours or they will lose access. When they click the link provided in the email, they are redirected to your own website where their credentials are captured to a text file. What kind of exploit did you use?
A. Phishing
B. Vishing
C. Smishing
D. Whaling
12. You are performing a gray box penetration test for a medium-sized organization. You have used reconnaissance techniques to identify a help desk employee and a payroll employee. You craft an email to the payroll employee that appears to come from the help desk employee directing the payroll employee to reset her password. When she clicks the link provided in the email, she is redirected to your own website where her credentials are captured to a text file. What kind of exploit did you use?
A. Phishing
B. Interrogation
C. Spear phishing
D. Whaling
13. You are performing a black box penetration test for a medium-sized organization. You have used reconnaissance techniques to identify the CEOs email address as well as the email address belonging to a help desk employee. You craft an email to the CEO that appears to come from the help desk employee directing the CEO to reset her password. When she clicks the link provided in the email, she is redirected to your own website where her credentials are captured to a text file. What kind of exploit did you use?
A. Smishing
B. Vishing
C. Spear phishing
D. Whaling
14. You are performing a black box penetration test for a medium-sized organization that sells imported clothing. You have used reconnaissance techniques to identify a key software developer. You send this employee a personalized text message containing a Bitly URL that points to your own website where you capture information to a text file.
What kind of exploit did you use in this scenario?
A. Phishing
B. Smishing
C. Vishing
D. Whaling
15. You are performing a black box penetration test for a small organization that wholesales imported electronic devices in the United States. You have used reconnaissance techniques to identify a receptionists phone number as well as the organizations printer vendor. You call this receptionist, pretending to be a sales rep from the vendor. You ask the receptionist for information about their printers, workstations, operating systems, and so on, to learn more about the organizations network infrastructure. What kind of exploit did you use in this scenario?
A. Smishing
B. Vishing
C. Spear phishing
D. Whaling
16. You are conducting a gray box penetration test for a client. You have identified an internal host with an IP address of 192.168.1.1 as a potential target. You need to use the nmap utility on your laptop to run a SYN port scan of this host. Which command should you use to do this?
A. nmap 192.168.1.1 -sS
B. nmap 192.168.1.1 -sT
C. nmap 192.168.1.1 -sU
D. nmap 192.168.1.1 -sA
17. You are conducting a white box penetration test for a client. You need to use the nmap utility on your laptop to run a scan of every host on the 192.168.1.0 subnet (which uses a subnet mask of 255.255.255.0). Which commands could you use to do this? (Choose two.)
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «CompTIA Pentest+ (Practice Exams)»

Look at similar books to CompTIA Pentest+ (Practice Exams). We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «CompTIA Pentest+ (Practice Exams)»

Discussion, reviews of the book CompTIA Pentest+ (Practice Exams) and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.