8. Post-Exploitation Techniques

  Ref:đź“•CompTIA PenTest+ PT0-002 Cert Guide (Certification Guide) 2nd Edition
Press the Start button to begin the practice test.

PenTest+ (PT0-002) Chapter 08. Performing Post-Exploitation Techniques

1 / 93

Which of the following is not true about PowerSploit and Empire?

2 / 93

What is the purpose of the PowerSploit script ’Invoke-Mimikatz’ as stated in the module/script description from Table 8-3?

3 / 93

Which of the following techniques is NOT used as part of a C2 system?

4 / 93

Which of the following describes the PowerSploit module ’Invoke-Portscan’?

5 / 93

Which Sysinternals tool allows you to run commands that can reveal information about running processes?

6 / 93

What is the concept of fileless malware in the context of post-exploitation techniques?

7 / 93

What is a covert channel in the context of attacking and compromising systems?

8 / 93

In the context of post-exploitation penetration testing using Sysinternals and PsExec, what action can PsExec perform?

9 / 93

What is the meaning of ’living-off-the-land’ in the context of post-exploitation activities?

10 / 93

How can you use PowerSploit for remote attacks?

11 / 93

What does the Mimikatz 2.0 module listed in PowerSploit in Table 8-3 do?

12 / 93

Which Sysinternals tool can a penetration tester use to change passwords on a compromised system?

13 / 93

How can an attacker maintain persistent access to a compromised Windows system using Windows Remote Management (WinRM)?

14 / 93

Which Sysinternals tool can be used by penetration testers to show the open files on a compromised host?

15 / 93

What is the purpose of the ’Set-MasterBootRecord’ module in PowerSploit?

16 / 93

What purpose does Windows Management Instrumentation (WMI) serve in Post-Exploitation Techniques?

17 / 93

What is the main advantage of PsExec for attackers during post-exploitation?

18 / 93

Which of the following is NOT a post-exploitation technique performed by PowerSploit?

19 / 93

When using PsExec tool as part of Sysinternals suite post-exploitation, what is the key advantage for an attacker?

20 / 93

What is the purpose of the Get-VolumeShadowCopy module in PowerSploit?

21 / 93

What is the purpose of the Invoke-ReflectivePE Injection module in PowerSploit?

22 / 93

Within the context of post-exploitation techniques, when PowerSploit is used, how is it typically exposed?

23 / 93

What is the main use of BloodHound in a Windows Active Directory environment?

24 / 93

What is a potential post-exploitation action an attacker could perform via PowerShell remoting?

25 / 93

Which of the following statements describes the use of PowerSploit and Empire in post-exploitation techniques?

26 / 93

What function does the Invoke-CredentialInjection module in PowerSploit serve?

27 / 93

What is the function of Out-CompressedDll script in the PowerSploit module collection?

28 / 93

What is the function of the ’Invoke-WmiCommand’ in PowerSploit?

29 / 93

What is the use of Get-MicrophoneAudio module in PowerSploit?

30 / 93

What is the primary use of the Empire PowerSploit suite during penetration testing?

31 / 93

What is the use of the PowerSploit module ’Invoke-DllInjection’ during post-exploitation?

32 / 93

What is the purpose of creating custom daemons and processes on a victim system during post-exploitation?

33 / 93

What is the purpose of using Get-GPPPassword module in PowerSploit?

34 / 93

What can be done after compromising a system with root access according to the text?

35 / 93

What is the purpose of the Out-Minidump module in the PowerSploit post-exploitation toolkit?

36 / 93

What is the main goal of the lateral movement post-exploitation technique ?

37 / 93

What is a covert channel in the context of Command and Control (C2) in post-exploitation techniques?

38 / 93

Which PowerSploit Module is predominantly used for taking screenshots at regular intervals?

39 / 93

What is a covert channel in the context of cyber security?

40 / 93

Which command is used to embed sensitive information within an image file using steghide?

41 / 93

What are some ways to maintain persistence in a compromised system according to the CompTIA PenTest+ (PT0-002) study material?

42 / 93

What is the main goal of lateral movement in the context of post-exploitation techniques?

43 / 93

Which of the following Sysinternals tools allows you to remotely execute anything that can run on a Windows command prompt?

44 / 93

What framework is mentioned in the text that offers the ability to run PowerShell agents without the need for powershell.exe?

45 / 93

Which of the following Sysinternals tools could be used to remotely execute commands and view the output on an attacker’s own system?

46 / 93

Which Sysinternals tool is used to execute anything that can run on a Windows command prompt remotely and modify Windows registry values?

47 / 93

What functionality does the PowerSploit module called ’Invoke-Mimikatz’ provide?

48 / 93

What is the main goal of lateral movement in post-exploitation?

49 / 93

Which of the following functionalities can NOT be achieved using the Sysinternals suite in a post-exploitation scenario?

50 / 93

What is the purpose of Invoke-Mimikatz in PowerSploit?

51 / 93

What is the fundamental difference between a bind shell and a reverse shell?

52 / 93

Which feature of the post-exploitation tool Empire is not correctly described based on the provided text?

53 / 93

Which PowerSploit module would you use for injecting a DLL into the process ID of your choosing?

54 / 93

Which post-exploitation module of PowerSploit is used to reflectively load Mimikatz 2.0 using PowerShell?

55 / 93

What is the purpose of a C2 (command and control) system in the context of cyber security attacks?

56 / 93

What is the primary role of PowerSploit during the post-exploitation phase of a penetration test?

57 / 93

Which of the following is true about PowerSploit and Empire?

58 / 93

Which among the following describes how PowerSploit is typically used in post-exploitation techniques?

59 / 93

Which of the following PowerShell commands can be used for post-exploitation tasks to avoid detection by security products and antivirus software by loading a PS1 file from the Internet and executing it on the device?

60 / 93

Which of the following Sysinternals tools can be used to kill processes on a Windows-based system during a penetration test?

61 / 93

Which of the followings are NOT correct according to the PowerSploit post-exploitation techniques?

62 / 93

Which of the following is not a function of the PowerSploit post-exploitation PowerShell module?

63 / 93

Which of the following are components of the Empire post-exploitation framework?

64 / 93

Which Sysinternals tool allows a penetration tester to interact with executables on a compromised host?

65 / 93

What is the main purpose of steghide in the context of penetration testing?

66 / 93

What is one main use of the Empire post-exploitation framework?

67 / 93

What is a characteristic of the PowerShell-based post-exploitation framework, Empire, used in cybersecurity?

68 / 93

Which of the following C2 utility allows attackers to use Twitter direct messages for command and control?

69 / 93

Which of the following statements about Windows Remote Management (WinRM) is incorrect?

70 / 93

What is the primary purpose of the steghide tool in a cyber attack?

71 / 93

Which of the following best describes the use of PowerSploit and Empire in a post-exploitation context?

72 / 93

What is the purpose of a covert channel in a command and control (C2) system?

73 / 93

What is the main goal of lateral movement, a post-exploitation technique?

74 / 93

Which command can an attacker use to enable Windows Remote Management (WinRM) on a Windows system?

75 / 93

How does an attacker maintain persistent access to compromised systems using Windows Remote Management (WinRM)?

76 / 93

What is the main advantage of using Microsoft’s Remote Desktop Protocol (RDP) in post-exploitation?

77 / 93

What best describes the use of the Twittor utility according to this text?

78 / 93

Which of the following Sysinternals tools would a penetration tester ideally use to execute processes on a compromised host?

79 / 93

Which of the following statements about the use of PowerSploit and Empire in post-exploitation is correct?

80 / 93

What function is served by the PsExec tool in the Sysinternals suite during post-exploitation in penetration testing?

81 / 93

What is the role of Windows Remote Management (WinRM) in post-exploitation activities?

82 / 93

What is the role of Windows Remote Management (WinRM) in post-exploitation techniques?

83 / 93

What is the term used to refer to the use of legitimate tools to perform post-exploitation activities?

84 / 93

What is a key advantage of using the Empire framework for post-exploitation?

85 / 93

What is a covert channel in context of performing post-exploitation techniques and command and control systems?

86 / 93

What is the role of the Get-VolumeShadowCopy script in PowerSploit?

87 / 93

Which of the following statements best describes the difference between a bind shell and a reverse shell?

88 / 93

Which of the following describes the use of the PowerSploit module Invoke-Shellcode during post-exploitation?

89 / 93

What is the purpose of the Invoke-NinjaCopy PowerSploit module?

90 / 93

How can an attacker use the Windows Task Scheduler for post-exploitation?

91 / 93

Which of the following correctly describes the use of PowerSploit in post-exploitation?

92 / 93

What does the Add-Persistence module in PowerSploit do?

93 / 93

What is the purpose of the ’New-ElevatedPersistence Option’ module in PowerSploit?

Your score is

Free CompTIA Pentest+ Anki decks are now available!

Click the download button after filling out the form below
to get your free practice exam Anki deck!

CompTIA Pentest+(pt0-002) Practice test Anki deck image
CompTIA Pentest+ Practice questions Sample image
Share the Post:

Related Posts

RSS  
  • Switching to IT or Cyber Security from Another Career
    Are you thinking about changing your career to IT or cyber security but worried about losing your current high salary? If yes, this guide is crafted just for you, especially if you have a family to support and don’t want to take a big pay cut. Understanding the Challenge A person reached out with a […]
  • How to Succeed in CySA+ Exam with Free Practice Questions
    Hey there! Are you getting ready for your CompTIA CySA+ exam? I’ve got great news for you! My team and I have created over a thousand practice questions to help you prepare, and they are all free! Keep reading to find out how these questions can help you pass with flying colors. What’s Available? **100% […]
  • From Call Center to IT Architect: Taylor’s Incredible Journey
    Introduction Today, we are going to share an amazing story about Taylor, who dramatically changed her career path from working in call centers to becoming an IT architect specialist. This journey is not just inspiring but also filled with practical tips and advice for anyone dreaming of making a big move in their career, especially […]
IT Course

The Affordable, Hands-On Josh Madakor IT Course that gets Results!

Ready to get started your journey?
Cyber Course

The Affordable, Hands-On Cyber Security that gets Results!

Ready to get started your journey?

JOIN OUR

NEWSLETTER

Sign up for our free newsletters.

by joining 8000+ others in my weekly newsletter 

where you’ll get a dose of my thoughts on self-improvement, career,

and life!