3. Info Gathering & Vulnerability Scanning

Press the Start button to begin the practice test.

PenTest+ (PT0-002) Chapter 03. Information Gathering and Vulnerability Scanning

1 / 102

What is the main purpose of using the -T0 (Paranoid) timing template with Nmap scanner?

2 / 102

What factor typically determines the type of vulnerability scan to utilize?

3 / 102

What is the first step of how a typical vulnerability scanner works as described in the text?

4 / 102

What function in Scapy can be used to navigate the Scapy layers and protocols?

5 / 102

What is the purpose of web page enumeration or web application enumeration during a penetration test?

6 / 102

What is the purpose of Scapy’s ls() function?

7 / 102

What is the purpose of enumeration techniques in the information-gathering phase of a penetration test?

8 / 102

Which of the following tools are most accurate in finding email addresses and passwords exposed in previous breaches?

9 / 102

What does the Nmap Humble Bundle smb-enum-shares NSE script use for network share enumeration?

10 / 102

What kind of Nmap scan is used to determine if a host is online and responding on a network?

11 / 102

What does a TCP SYN-ACK response indicate when performing a port scan using Nmap?

12 / 102

Which department does the U.S. Computer Emergency Readiness Team (US-CERT) operate under?

13 / 102

Why is it essential to customize your plugin selection when conducting a full scan using a vulnerability scanner?

14 / 102

How do attackers gather information from social media for social engineering attacks?

15 / 102

What is the purpose of using the nmap -sC command in the context of pentesting?

16 / 102

What does the ’nmap -sC’ command do in an information gathering and vulnerability scanning context?

17 / 102

Which of the following advanced operators in Google enables searching within the text of a particular file type?

18 / 102

Why is an authenticated scan often preferable when you need to gather in-depth information about a system’s vulnerabilities?

19 / 102

How can public source code repositories be beneficial for an attacker or a penetration tester?

20 / 102

What does the -T4 (Aggressive) timing option in the Nmap scanner signify?

21 / 102

What is the main goal of US-CERT?

22 / 102

In the context of penetration testing, what additional information does an authenticated scan with root-level access provide compared to a scan by a non-privileged user when using the netstat command?

23 / 102

What function does Scapy offer to list all available formats and protocols?

24 / 102

What is Open-Source Intelligence (OSINT) Gathering as used in the context of Penetration Testing?

25 / 102

What is the purpose of an active scan like a port scan during the enumeration stage of a penetration test?

26 / 102

What does the base score in the Common Vulnerability Scoring System (CVSS) represent?

27 / 102

What is Google hacking and how can hackers use it?

28 / 102

What is the Nmap script smb-enum-shares.nse primarily used for?

29 / 102

What command is used to retrieve the organization name (OrgName) of the owner for an IP address?

30 / 102

What is Recon-ng and why is it effective?

31 / 102

What is the primary limitation of unauthenticated scans with vulnerability scanners?

32 / 102

What is the role of the CERT Division of Carnegie Mellon University in cybersecurity?

33 / 102

What is the purpose of advanced operators used in Google hacking?

34 / 102

What is the primary difference between an unauthenticated scan and an authenticated scan when utilizing a vulnerability scanner?

35 / 102

Which command is used to retrieve the organization name of the owner for particular IP addresses?

36 / 102

What does Recon-ng use to gather information from various OSINT resources, such as Facebook, Indeed, Flickr, Instagram, Shodan, LinkedIn, and YouTube?

37 / 102

Which of the following is true about Recon-ng from the following statements?

38 / 102

Which of the following best describes the difference between Active Reconnaissance and Passive Reconnaissance in the context of cybersecurity?

39 / 102

What happens when Nmap, during a UDP scan, receives no response from the target UDP port?

40 / 102

What is the purpose of running a port scan in a penetration test?

41 / 102

What is the main difference between active and passive reconnaissance techniques in a cyber attack?

42 / 102

What does the lack of a response from TCP FIN scan (-sF) indicate about the target port?

43 / 102

What are some of the qualities and uses of the Nikto web server enumeration tool?

44 / 102

What is the primary method used by vulnerability scanners to determine if a service is susceptible?

45 / 102

What is one method to carry out query throttling during vulnerability scanning?

46 / 102

What do you need to consider when deciding the best time to run a vulnerability scan on a production network?

47 / 102

Which of the following can the information from a target’s SSL certificates potentially reveal?

48 / 102

Which tool can be used to find email addresses and passwords exposed in previous breaches?

49 / 102

Which organization operates an internet repository known as the ’Wayback Machine’?

50 / 102

What is the primary purpose of the Common Weakness Enumeration (CWE)?

51 / 102

What is the purpose of the smb-enum-processes NSE script used in Nmap?

52 / 102

What is the structure of a CVE ID?

53 / 102

Which function in Scapy is used to list all available formats and protocols?

54 / 102

What is the primary purpose of using the -T1 (Sneaky) timing template with the Nmap scanner?

55 / 102

Why would an attacker target h4cker.org use DNS lookups in the initial stages of preparing an attack?

56 / 102

What is the function of the ’ls()’ command in the Scapy Python-based framework?

57 / 102

In the context of Penetration Testing, how can the SMB_COM_NEGOTIATE message be utilized?

58 / 102

What is the use of ’modules load’ command in Recon-ng tool?

59 / 102

Why might it be necessary to adjust scanner settings while performing a vulnerability scan?

60 / 102

Which of the following best describes the use of h8mail?

61 / 102

What does the letter ’D’ in the table header of Recon-ng’s module list indicate?

62 / 102

Which of the following statements best describes TCP connect scan (-sT) in Nmap?

63 / 102

What is the role of the JPCERT?

64 / 102

What considerations must a penetration tester make in order to prioritize the vulnerabilities found?

65 / 102

Which of the following Advanced Google Operators would you use to direct Google to search for a term within the title of a document?

66 / 102

According to the text, what could be a potential approach to scan fragile systems without causing them to crash?

67 / 102

Which of the following information can be obtained from file metadata?

68 / 102

What is the purpose of using Nmap’s http-enum NSE script in web application enumeration?

69 / 102

What function can you use in Scapy to list all available formats and protocols?

70 / 102

What is the primary role and responsibility of the National Institute of Standards and Technology (NIST)?

71 / 102

Where should a vulnerability scan be performed in the network topology to ensure accuracy and minimal network impact?

72 / 102

Which advanced search operator directs Google to search only within the text of a particular type of file?

73 / 102

What is the primary purpose of discovery scan in penetration testing?

74 / 102

What does the Scapy function ’ls()’ demonstrate in network enumeration?

75 / 102

Which Nmap timing template is ideal for a fast and reliable network but may overwhelm targets?

76 / 102

What is the difference between active and passive reconnaissance in a penetration testing engagement?

77 / 102

What is the primary function of the SMB_COM_SESSION_SETUP_ANDX message in an SMB implementation?

78 / 102

What can Shodan be used to query for during Information Gathering and Vulnerability scanning?

79 / 102

Which of the following accurately describes a feature of vulnerability scanners in relation to compliance scans?

80 / 102

What is the purpose of the ’-sC’ option when used with the ’nmap’ command?

81 / 102

From the provided examples, what is one way organizations may prefer to protect their public Whois information?

82 / 102

What should be in your attention when conducting a vulnerability scan based on the given text?

83 / 102

What is the primary function of Recon-ng as discussed in the text?

84 / 102

Which among the following Nmap timing templates is to be used when trying to be very aggressive, but this may likely overwhelm the targets or even miss open ports?

85 / 102

What are the benefits of running an authenticated scan for penetration testing?

86 / 102

Which of the following correctly describes host enumeration in the context of a penetration test?

87 / 102

What is the primary purpose of a discovery scan in a penetration testing process?

88 / 102

Which of the following accurately describes a passive vulnerability scanner?

89 / 102

Why is a TCP connect scan (-sT) by Nmap not typically used unless a SYN scan is not an option?

90 / 102

What is the primary function of the SMB_COM_SESSION_SETUP_ANDX message in a Windows network?

91 / 102

Which Nmap timing template is used for IDS evasion and is very slow?

92 / 102

What is the purpose of the Common Attack Pattern Enumeration and Classification (CAPEC)?

93 / 102

What is the purpose of the Nmap smb-enum-processes NSE script?

94 / 102

Which of the following statements about the Recon-ng tool is not true?

95 / 102

What is the process to eliminate false positives in a vulnerability scanning tool?

96 / 102

What tool is used to determine the organization name of the owners of specific IP addresses?

97 / 102

What data can attackers leverage while trying to gather information about their victims?

98 / 102

What functionality makes Recon-ng highly effective in social networking site enumeration during the Penetration Testing process?

99 / 102

What does the -T3 (Normal) option specify in an Nmap scan?

100 / 102

What is the main purpose of the host enumeration during the process of the penetration testing?

101 / 102

What is the main advantage of using a wireless connection for packet inspection and eavesdropping during penetration testing?

102 / 102

Why is it important to determine what protocols are in use before running a vulnerability scan?

Your score is

Boost Your Skills with Free Anki Flashcards

Click the download button to get the CompTIA Pentest+ Anki deck.

CompTIA Pentest+(pt0-002) Practice test Anki deck image
CompTIA Pentest+ Practice questions Sample image

Enhance your skills in information gathering and vulnerability scanning with our CompTIA PenTest+ Chapter 03 practice questions.

This chapter delves into reconnaissance techniques, data analysis, and vulnerability assessment tools.
Mastery of these skills is crucial for identifying potential security threats.
Leverage our free Anki decks for additional practice.
For official resources, visit CompTIA’s website.

Ready to progress? Continue to Chapter 04: Social Engineering Attacks to expand your knowledge.

Explore our other free practice tests:

Share the Post:

Related Posts

RSS  
  • Discover How to Work Remotely and Travel!
    Have you ever dreamed about working from beautiful places like Thailand or Japan, but weren’t sure if it’s possible? I’m here to share my adventures and some tips on how to make working remotely while exploring the world a reality.  Who Am I? My name is Josh, and I’m all about creating helpful content on […]
  • Why Contract Work in IT Can Be a Good Start for Your Career
    Hey buddies! Are you curious about what it’s like to work in IT and cyber security? Well, you’re in luck because today we’re diving into the world of contract work and how it might just be the jumpstart your career needed! Getting Into the World of Contract Work in IT Josh, an expert in IT […]
  • Is Cyber Security a Career That Will Last Forever?
    Hey everyone! Have you ever wondered if choosing a career in cyber security is a good idea for the long haul? Well, let’s dive into this topic with the help of Josh Maor’s insights, and find out why cyber security might just be one of the smartest career choices out there. What Is Cyber Security? […]
IT Course

The Affordable, Hands-On Josh Madakor IT Course that gets Results!

Ready to get started your journey?
Cyber Course

The Affordable, Hands-On Cyber Security that gets Results!

Ready to get started your journey?

JOIN OUR

NEWSLETTER

Sign up for our free newsletters.

by joining 8000+ others in my weekly newsletter 

where you’ll get a dose of my thoughts on self-improvement, career,

and life!