8. Post-Exploitation Techniques

  Ref:đź“•CompTIA PenTest+ PT0-002 Cert Guide (Certification Guide) 2nd Edition
Press the Start button to begin the practice test.

PenTest+ (PT0-002) Chapter 08. Performing Post-Exploitation Techniques

1 / 93

What is the main advantage of using Microsoft’s Remote Desktop Protocol (RDP) in post-exploitation?

2 / 93

What is the purpose of using Get-GPPPassword module in PowerSploit?

3 / 93

Which of the following are components of the Empire post-exploitation framework?

4 / 93

What is the role of Windows Remote Management (WinRM) in post-exploitation activities?

5 / 93

What is the function of Out-CompressedDll script in the PowerSploit module collection?

6 / 93

What is the role of Windows Remote Management (WinRM) in post-exploitation techniques?

7 / 93

What is the term used to refer to the use of legitimate tools to perform post-exploitation activities?

8 / 93

When using PsExec tool as part of Sysinternals suite post-exploitation, what is the key advantage for an attacker?

9 / 93

Which of the following is NOT a post-exploitation technique performed by PowerSploit?

10 / 93

What is the purpose of a C2 (command and control) system in the context of cyber security attacks?

11 / 93

Which of the following statements about the use of PowerSploit and Empire in post-exploitation is correct?

12 / 93

Within the context of post-exploitation techniques, when PowerSploit is used, how is it typically exposed?

13 / 93

Which Sysinternals tool allows a penetration tester to interact with executables on a compromised host?

14 / 93

What is the purpose of the PowerSploit script ’Invoke-Mimikatz’ as stated in the module/script description from Table 8-3?

15 / 93

Which command can an attacker use to enable Windows Remote Management (WinRM) on a Windows system?

16 / 93

What are some ways to maintain persistence in a compromised system according to the CompTIA PenTest+ (PT0-002) study material?

17 / 93

What is the purpose of the ’Set-MasterBootRecord’ module in PowerSploit?

18 / 93

What framework is mentioned in the text that offers the ability to run PowerShell agents without the need for powershell.exe?

19 / 93

What is a key advantage of using the Empire framework for post-exploitation?

20 / 93

What purpose does Windows Management Instrumentation (WMI) serve in Post-Exploitation Techniques?

21 / 93

How does an attacker maintain persistent access to compromised systems using Windows Remote Management (WinRM)?

22 / 93

What is the main goal of lateral movement, a post-exploitation technique?

23 / 93

Which of the following Sysinternals tools could be used to remotely execute commands and view the output on an attacker’s own system?

24 / 93

What is the primary purpose of the steghide tool in a cyber attack?

25 / 93

Which of the following statements about Windows Remote Management (WinRM) is incorrect?

26 / 93

What best describes the use of the Twittor utility according to this text?

27 / 93

Which Sysinternals tool can be used by penetration testers to show the open files on a compromised host?

28 / 93

Which of the following Sysinternals tools allows you to remotely execute anything that can run on a Windows command prompt?

29 / 93

Which of the following Sysinternals tools would a penetration tester ideally use to execute processes on a compromised host?

30 / 93

What is the fundamental difference between a bind shell and a reverse shell?

31 / 93

What is the use of Get-MicrophoneAudio module in PowerSploit?

32 / 93

How can an attacker use the Windows Task Scheduler for post-exploitation?

33 / 93

Which of the following is not true about PowerSploit and Empire?

34 / 93

How can you use PowerSploit for remote attacks?

35 / 93

What is the purpose of creating custom daemons and processes on a victim system during post-exploitation?

36 / 93

Which of the following is not a function of the PowerSploit post-exploitation PowerShell module?

37 / 93

What is the concept of fileless malware in the context of post-exploitation techniques?

38 / 93

Which of the following C2 utility allows attackers to use Twitter direct messages for command and control?

39 / 93

Which Sysinternals tool is used to execute anything that can run on a Windows command prompt remotely and modify Windows registry values?

40 / 93

What is a covert channel in the context of Command and Control (C2) in post-exploitation techniques?

41 / 93

What is a covert channel in the context of attacking and compromising systems?

42 / 93

Which of the following PowerShell commands can be used for post-exploitation tasks to avoid detection by security products and antivirus software by loading a PS1 file from the Internet and executing it on the device?

43 / 93

What is the purpose of the Invoke-NinjaCopy PowerSploit module?

44 / 93

Which of the following describes the PowerSploit module ’Invoke-Portscan’?

45 / 93

What is the main advantage of PsExec for attackers during post-exploitation?

46 / 93

What is the purpose of the Invoke-ReflectivePE Injection module in PowerSploit?

47 / 93

What is the main use of BloodHound in a Windows Active Directory environment?

48 / 93

What is one main use of the Empire post-exploitation framework?

49 / 93

How can an attacker maintain persistent access to a compromised Windows system using Windows Remote Management (WinRM)?

50 / 93

What is the purpose of Invoke-Mimikatz in PowerSploit?

51 / 93

What is the primary role of PowerSploit during the post-exploitation phase of a penetration test?

52 / 93

What is a characteristic of the PowerShell-based post-exploitation framework, Empire, used in cybersecurity?

53 / 93

Which of the following correctly describes the use of PowerSploit in post-exploitation?

54 / 93

Which of the following describes the use of the PowerSploit module Invoke-Shellcode during post-exploitation?

55 / 93

What is the function of the ’Invoke-WmiCommand’ in PowerSploit?

56 / 93

What is the main goal of lateral movement in post-exploitation?

57 / 93

Which PowerSploit module would you use for injecting a DLL into the process ID of your choosing?

58 / 93

Which command is used to embed sensitive information within an image file using steghide?

59 / 93

What can be done after compromising a system with root access according to the text?

60 / 93

Which of the following statements describes the use of PowerSploit and Empire in post-exploitation techniques?

61 / 93

What is the primary use of the Empire PowerSploit suite during penetration testing?

62 / 93

Which PowerSploit Module is predominantly used for taking screenshots at regular intervals?

63 / 93

In the context of post-exploitation penetration testing using Sysinternals and PsExec, what action can PsExec perform?

64 / 93

What is the purpose of the Get-VolumeShadowCopy module in PowerSploit?

65 / 93

What is the use of the PowerSploit module ’Invoke-DllInjection’ during post-exploitation?

66 / 93

Which feature of the post-exploitation tool Empire is not correctly described based on the provided text?

67 / 93

Which of the following statements best describes the difference between a bind shell and a reverse shell?

68 / 93

What is the purpose of the ’New-ElevatedPersistence Option’ module in PowerSploit?

69 / 93

What is the main goal of the lateral movement post-exploitation technique ?

70 / 93

What functionality does the PowerSploit module called ’Invoke-Mimikatz’ provide?

71 / 93

What is a potential post-exploitation action an attacker could perform via PowerShell remoting?

72 / 93

What is the meaning of ’living-off-the-land’ in the context of post-exploitation activities?

73 / 93

What function is served by the PsExec tool in the Sysinternals suite during post-exploitation in penetration testing?

74 / 93

Which of the followings are NOT correct according to the PowerSploit post-exploitation techniques?

75 / 93

What is a covert channel in the context of cyber security?

76 / 93

Which of the following techniques is NOT used as part of a C2 system?

77 / 93

What does the Mimikatz 2.0 module listed in PowerSploit in Table 8-3 do?

78 / 93

What is the main goal of lateral movement in the context of post-exploitation techniques?

79 / 93

What is the main purpose of steghide in the context of penetration testing?

80 / 93

What is the purpose of the Out-Minidump module in the PowerSploit post-exploitation toolkit?

81 / 93

Which Sysinternals tool can a penetration tester use to change passwords on a compromised system?

82 / 93

Which post-exploitation module of PowerSploit is used to reflectively load Mimikatz 2.0 using PowerShell?

83 / 93

What is the role of the Get-VolumeShadowCopy script in PowerSploit?

84 / 93

Which of the following is true about PowerSploit and Empire?

85 / 93

Which of the following Sysinternals tools can be used to kill processes on a Windows-based system during a penetration test?

86 / 93

Which among the following describes how PowerSploit is typically used in post-exploitation techniques?

87 / 93

What is a covert channel in context of performing post-exploitation techniques and command and control systems?

88 / 93

Which of the following best describes the use of PowerSploit and Empire in a post-exploitation context?

89 / 93

Which of the following functionalities can NOT be achieved using the Sysinternals suite in a post-exploitation scenario?

90 / 93

What does the Add-Persistence module in PowerSploit do?

91 / 93

What function does the Invoke-CredentialInjection module in PowerSploit serve?

92 / 93

What is the purpose of a covert channel in a command and control (C2) system?

93 / 93

Which Sysinternals tool allows you to run commands that can reveal information about running processes?

Your score is

Free CompTIA Pentest+ Anki decks are now available!

Click the download button after filling out the form below
to get your free practice exam Anki deck!

CompTIA Pentest+(pt0-002) Practice test Anki deck image
CompTIA Pentest+ Practice questions Sample image
Share the Post:

Related Posts

RSS  
  • Switching to IT or Cyber Security from Another Career
    Are you thinking about changing your career to IT or cyber security but worried about losing your current high salary? If yes, this guide is crafted just for you, especially if you have a family to support and don’t want to take a big pay cut. Understanding the Challenge A person reached out with a […]
  • How to Succeed in CySA+ Exam with Free Practice Questions
    Hey there! Are you getting ready for your CompTIA CySA+ exam? I’ve got great news for you! My team and I have created over a thousand practice questions to help you prepare, and they are all free! Keep reading to find out how these questions can help you pass with flying colors. What’s Available? **100% […]
  • From Call Center to IT Architect: Taylor’s Incredible Journey
    Introduction Today, we are going to share an amazing story about Taylor, who dramatically changed her career path from working in call centers to becoming an IT architect specialist. This journey is not just inspiring but also filled with practical tips and advice for anyone dreaming of making a big move in their career, especially […]
IT Course

The Affordable, Hands-On Josh Madakor IT Course that gets Results!

Ready to get started your journey?
Cyber Course

The Affordable, Hands-On Cyber Security that gets Results!

Ready to get started your journey?

JOIN OUR

NEWSLETTER

Sign up for our free newsletters.

by joining 8000+ others in my weekly newsletter 

where you’ll get a dose of my thoughts on self-improvement, career,

and life!