Inspirational journeys

Follow the stories of academics and their research expeditions

Comptia Pentest+ 2023 Questions and answer - Part 19

Mary Smith

Wed, 15 Apr 2026

Comptia Pentest+ 2023 Questions and answer - Part 19

1. In exploit chaining, what type of propagation requires an attack toolkit to be installed on an attacker-s machine when the attacker tries to exploit the vulnerable machine, opening a connection on the infected system to accept the file transfer request?

A) Central Source Propagation
B) Back-chaining Propagation
C) Autonomous Propagation
D) None of the above



2. Which of the following is a common attack area for IoT network?

A) Device Memory containing credentials
B) Access Control
C) Firmware Extraction
D) Web Attacks
E) All of the above


3. What type of attack is performed using different techniques to exploit Bluetooth vulnerabilities?

A) Jamming Attack
B) BlueBorne Attack
C) Rolling Code Attack
D) Deception Attack



4. Which of the following network-based attacks consists of overwriting a name resolution cache with a malicious web address that results in targeted users visiting the malicious site rather than the one they intended to visit?

A) Waterholing
B) ARP Spoofing
C) DNS Cache Poisoning
D) Relay Attack



5. Which command-line exclusive network protocol is used to analyze tools that allow to capture packet dumps to and from a given network interface or host and network behavior responses?

A) Responder
B) tcpdump
C) hping3
D) Wireshark



1. Right Answer: B
Explanation: Back-Chaining propagation requires an attack toolkit to be installed on the attacker-s machine. When an attacker exploits the vulnerable machine; it opens the connection on the infected system to accept the file transfer request. Then, the toolkit is copied from the attacker-s machine. Once the toolkit is installed on the infected system, it will search for other vulnerable systems, and the process will continue.

2. Right Answer: E
Explanation: Following are the most common attack areas for IoT network: Device Memory containing credentials Access Control Firmware Extraction Privileges Escalation Resetting -I am resetting to an insecure state Removal of storage media Web Attacks Firmware Attacks Network Services Attacks Unencrypted Local Data Storage Confidentiality and Integrity Issues Cloud Computing Attacks Malicious updates Insecure APIs Mobile Application Threats

3. Right Answer: B
Explanation: BlueBorne Attack is performed using different techniques to exploit Bluetooth vulnerabilities. This collection of techniques to gain unauthorized access to Bluetooth enabled devices is called a Blueborne attack.

4. Right Answer: C
Explanation: The attack is DNS cache poisoning, which is also called DNS spoofing.

5. Right Answer: B
Explanation: tcpdump is a command-line exclusive tool that allows sniffing network traffic and packet. Dumps (PCAP files) can be created to and from a given network interface or host.

0 Comments

Leave a comment