Verified Test Bank Penetration Testing Tools Chapter 9 - Model Test Questions | CompTIA PenTest+ 1e Santos by Omar Santos. DOCX document preview.
CompTIA® PenTest+ Cert Guide
Chapter 9 Penetration Testing Tools
1) What is CAINE?
A) A reconnaissance tool
B) A password hacking tool
C) A Linux distribution for digital forensics
D) A utility for creating malware
2) What is OSINT?
A) A password hacking tool
B) A Linux distribution for penetration testing
C) A set of Metasploit scripts
D) Publicly available information
3) Which of these is a tool for passive reconnaissance?
A) Ncrack
B) Maltego
C) Medusa
D) Qualsys
4) What can you not learn from whois?
A) Registrar
B) Name servers
C) Domain status
D) Server operating system
5) What does Theharvester provide?
A) Server operating system type
B) Server operating system version
C) DNS information about a given hostname
D) Whether or not certain application vulnerabilities are present
6) What is Security Onion?
A) Search engine for devices connected to the Internet
B) A password hacking tool
C) A Linux distribution for intrusion detection
D) A utility for creating malware
7) What is Shodan?
A) Search engine for devices connected to the Internet
B) A password hacking tool
C) A Linux distribution for penetration testing
D) A utility for creating malware
8) Which tool automates information gathering from OSINT?
A) Parrot
B) Recon-ng
C) netcat
D) Shodan
9) To use Recon-ng to query third-party tools such as Instagram, you must register and obtain what?
A) An API
B) A license from the federal government
C) Written permission from the owner of the third-party account
D) A decryption key
10) Which of these is not an active reconnaissance tool?
A) Enum4linux
B) Nmap
C) Zenmap
D) Censys
11) Nmap and Zenmap are best known for:
A) Gathering OSINT information
B) Host enumeration
C) Credential attacks
D) SQL injection
12) Which of these is not a popular vulnerability scanner?
A) Maltego
B) Nikto
C) OpenVAS
D) Nexpose
13) What does SQLmap do?
A) Performs exploits using SQL injection techniques
B) Creates malware to be used against SQL databases
C) Returns publicly available information about a database
D) Launches DDoS attacks
14) Which of these is not a tool for credential attacks?
A) Cain and Abel
B) Nmap
C) Mimikatz
D) Medusa
15) Which of these is not a way that password cracking tools operate?
A) Cryptanalysis
B) Dictionary attacks
C) Wordlists
D) Random number generation
16) How can RainbowCrack determine an account’s password?
A) Reversing cryptographic hash functions
B) Referring to a wordlist of known hacked passwords
C) Trying every word in a dictionary file until a match is found
D) Comparing user IDs with an SQL database of hacked passwords
17) What does CeWL do?
A) Reverse cryptographic hash functions
B) Comparing user IDs with an SQL database of hacked passwords
C) Create wordlists for password cracking
D) Query OSINT
18) Which of these is a remote access protocol you can use to communicate with a compromised system?
A) VNC
B) PowerShell
C) SQL
D) Veil
19) Which of these is a tool for evasion and privacy?
A) Kali
B) Mimikatz
C) VNC
D) Tor
20) Which of these would be a good choice for writing scripts for penetration testing?
A) C++
B) Bash
C) Java
D) HTML