Verified Test Bank Penetration Testing Tools Chapter 9 - Model Test Questions | CompTIA PenTest+ 1e Santos by Omar Santos. DOCX document preview.

Verified Test Bank Penetration Testing Tools Chapter 9

CompTIA® PenTest+ Cert Guide

Chapter 9 Penetration Testing Tools

1) What is CAINE?

A) A reconnaissance tool

B) A password hacking tool

C) A Linux distribution for digital forensics

D) A utility for creating malware

2) What is OSINT?

A) A password hacking tool

B) A Linux distribution for penetration testing

C) A set of Metasploit scripts

D) Publicly available information

3) Which of these is a tool for passive reconnaissance?

A) Ncrack

B) Maltego

C) Medusa

D) Qualsys

4) What can you not learn from whois?

A) Registrar

B) Name servers

C) Domain status

D) Server operating system

5) What does Theharvester provide?

A) Server operating system type

B) Server operating system version

C) DNS information about a given hostname

D) Whether or not certain application vulnerabilities are present

6) What is Security Onion?

A) Search engine for devices connected to the Internet

B) A password hacking tool

C) A Linux distribution for intrusion detection

D) A utility for creating malware

7) What is Shodan?

A) Search engine for devices connected to the Internet

B) A password hacking tool

C) A Linux distribution for penetration testing

D) A utility for creating malware

8) Which tool automates information gathering from OSINT?

A) Parrot

B) Recon-ng

C) netcat

D) Shodan

9) To use Recon-ng to query third-party tools such as Instagram, you must register and obtain what?

A) An API

B) A license from the federal government

C) Written permission from the owner of the third-party account

D) A decryption key

10) Which of these is not an active reconnaissance tool?

A) Enum4linux

B) Nmap

C) Zenmap

D) Censys

11) Nmap and Zenmap are best known for:

A) Gathering OSINT information

B) Host enumeration

C) Credential attacks

D) SQL injection

12) Which of these is not a popular vulnerability scanner?

A) Maltego

B) Nikto

C) OpenVAS

D) Nexpose

13) What does SQLmap do?

A) Performs exploits using SQL injection techniques

B) Creates malware to be used against SQL databases

C) Returns publicly available information about a database

D) Launches DDoS attacks

14) Which of these is not a tool for credential attacks?

A) Cain and Abel

B) Nmap

C) Mimikatz

D) Medusa

15) Which of these is not a way that password cracking tools operate?

A) Cryptanalysis

B) Dictionary attacks

C) Wordlists

D) Random number generation

16) How can RainbowCrack determine an account’s password?

A) Reversing cryptographic hash functions

B) Referring to a wordlist of known hacked passwords

C) Trying every word in a dictionary file until a match is found

D) Comparing user IDs with an SQL database of hacked passwords

17) What does CeWL do?

A) Reverse cryptographic hash functions

B) Comparing user IDs with an SQL database of hacked passwords

C) Create wordlists for password cracking

D) Query OSINT

18) Which of these is a remote access protocol you can use to communicate with a compromised system?

A) VNC

B) PowerShell

C) SQL

D) Veil

19) Which of these is a tool for evasion and privacy?

A) Kali

B) Mimikatz

C) VNC

D) Tor

20) Which of these would be a good choice for writing scripts for penetration testing?

A) C++

B) Bash

C) Java

D) HTML

Document Information

Document Type:
DOCX
Chapter Number:
9
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 9 Penetration Testing Tools
Author:
Omar Santos

Connected Book

Model Test Questions | CompTIA PenTest+ 1e Santos

By Omar Santos

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party