Inspirational journeys

Follow the stories of academics and their research expeditions

Comptia Pentest+ 2023 Questions and answer - Part 29

Mary Smith

Wed, 15 Apr 2026

Comptia Pentest+ 2023 Questions and answer - Part 29

1. The technique of passing the restricted area by an unauthorized person with an authorized identification is called ________________.

A) Tailgating
B) Piggybacking
C) Impersonation
D) Shoulder Surfing



2. When an attack denies the services and resources, and becomes unavailable for legitimate users, it is known as ___________________.

A) DoS Attack
B) Application Layer Attack
C) SQL Injection
D) Network Layer Attack



3. DoS attack in which flooding of the request overloads web application or web server is known as ______________________.

A) SYN Attack / Flooding
B) Service Request Flood
C) ICMP Flood Attack
D) Peer-to-Peer Attack



4. DoS Attack focused on hardware sabotage is known as ____________.

A) DoS Attack
B) DDoS Attack
C) PDoS Attack
D) DRDoS Attack



5. DoS attack in which Intermediary and Secondary victims are also involved in the process of launching a DoS attack is known as ____________________.

A) DRDoS
B) PDoS
C) DDoS
D) Botnets



1. Right Answer: A
Explanation: Piggybacking is the technique in which an unauthorized person waits for an authorized person to gain entry to a restricted are

2. Right Answer: B
Explanation: Tailgating is the technique in which an unauthorized person gains access to the restricted area by following an authorized person.

3. Right Answer: C
Explanation: Service Request Flood is a DoS attack in which attacker floods the request towards a service such as Web application or Web server until all the service is overloade

4. Right Answer: A
Explanation: The permanent Denial-of-Service attack is the DoS attack, which instead of focusing on denial of services, focuses on hardware sabotage. Affected hardware by PDoS attack is damaged, requiring replacement or reinstallation of hardware. PDoS is performed by a method known as -Phlashing that causes irreversible damage to the hardware, or -Bricking a system by sending fraudulent hardware updates. Usually this malicious code is executed accidentally by the victim.

5. Right Answer: C
Explanation: Distributed Reflection Denial-of-Service attack is the type of DoS attack in which intermediary and secondary victims are also involved in the process of launching a DoS attack. Attacker sends requests to the intermediary victim, which redirects the traffic towards the Secondary victim. Secondary victim redirects the traffic towards the target. Involvement of intermediary and secondary victim is for spoofing the attack.

0 Comments

Leave a comment