Press the Start button to begin the practice test.

PenTest+ (PT0-002) Chapter 08. Performing Post-Exploitation Techniques

1 / 93

Which of the following describes the PowerSploit module ’Invoke-Portscan’?

2 / 93

What is the role of Windows Remote Management (WinRM) in post-exploitation activities?

3 / 93

How can an attacker maintain persistent access to a compromised Windows system using Windows Remote Management (WinRM)?

4 / 93

Which of the following are components of the Empire post-exploitation framework?

5 / 93

What is a covert channel in the context of attacking and compromising systems?

6 / 93

Which of the following statements describes the use of PowerSploit and Empire in post-exploitation techniques?

7 / 93

What is a key advantage of using the Empire framework for post-exploitation?

8 / 93

What does the Mimikatz 2.0 module listed in PowerSploit in Table 8-3 do?

9 / 93

Which of the following statements best describes the difference between a bind shell and a reverse shell?

10 / 93

Which of the following Sysinternals tools allows you to remotely execute anything that can run on a Windows command prompt?

11 / 93

Which of the followings are NOT correct according to the PowerSploit post-exploitation techniques?

12 / 93

How does an attacker maintain persistent access to compromised systems using Windows Remote Management (WinRM)?

13 / 93

What is the fundamental difference between a bind shell and a reverse shell?

14 / 93

What is the purpose of using Get-GPPPassword module in PowerSploit?

15 / 93

What is a covert channel in the context of Command and Control (C2) in post-exploitation techniques?

16 / 93

Within the context of post-exploitation techniques, when PowerSploit is used, how is it typically exposed?

17 / 93

Which of the following PowerShell commands can be used for post-exploitation tasks to avoid detection by security products and antivirus software by loading a PS1 file from the Internet and executing it on the device?

18 / 93

What is the primary role of PowerSploit during the post-exploitation phase of a penetration test?

19 / 93

Which command can an attacker use to enable Windows Remote Management (WinRM) on a Windows system?

20 / 93

Which of the following Sysinternals tools can be used to kill processes on a Windows-based system during a penetration test?

21 / 93

Which of the following is true about PowerSploit and Empire?

22 / 93

Which Sysinternals tool can be used by penetration testers to show the open files on a compromised host?

23 / 93

What is the purpose of the ’Set-MasterBootRecord’ module in PowerSploit?

24 / 93

Which Sysinternals tool allows you to run commands that can reveal information about running processes?

25 / 93

How can you use PowerSploit for remote attacks?

26 / 93

What is the main purpose of steghide in the context of penetration testing?

27 / 93

Which of the following Sysinternals tools could be used to remotely execute commands and view the output on an attacker’s own system?

28 / 93

When using PsExec tool as part of Sysinternals suite post-exploitation, what is the key advantage for an attacker?

29 / 93

Which PowerSploit Module is predominantly used for taking screenshots at regular intervals?

30 / 93

What is the meaning of ’living-off-the-land’ in the context of post-exploitation activities?

31 / 93

What can be done after compromising a system with root access according to the text?

32 / 93

Which of the following techniques is NOT used as part of a C2 system?

33 / 93

Which Sysinternals tool is used to execute anything that can run on a Windows command prompt remotely and modify Windows registry values?

34 / 93

What is the function of Out-CompressedDll script in the PowerSploit module collection?

35 / 93

Which of the following is not a function of the PowerSploit post-exploitation PowerShell module?

36 / 93

In the context of post-exploitation penetration testing using Sysinternals and PsExec, what action can PsExec perform?

37 / 93

Which among the following describes how PowerSploit is typically used in post-exploitation techniques?

38 / 93

Which of the following functionalities can NOT be achieved using the Sysinternals suite in a post-exploitation scenario?

39 / 93

What is the main goal of lateral movement in the context of post-exploitation techniques?

40 / 93

What is one main use of the Empire post-exploitation framework?

41 / 93

Which of the following describes the use of the PowerSploit module Invoke-Shellcode during post-exploitation?

42 / 93

What is the purpose of a covert channel in a command and control (C2) system?

43 / 93

What is the role of Windows Remote Management (WinRM) in post-exploitation techniques?

44 / 93

What is a characteristic of the PowerShell-based post-exploitation framework, Empire, used in cybersecurity?

45 / 93

What is the purpose of the PowerSploit script ’Invoke-Mimikatz’ as stated in the module/script description from Table 8-3?

46 / 93

What is the purpose of the Out-Minidump module in the PowerSploit post-exploitation toolkit?

47 / 93

What is the main advantage of PsExec for attackers during post-exploitation?

48 / 93

What is the purpose of the Get-VolumeShadowCopy module in PowerSploit?

49 / 93

What is the use of Get-MicrophoneAudio module in PowerSploit?

50 / 93

Which of the following best describes the use of PowerSploit and Empire in a post-exploitation context?

51 / 93

What is the purpose of creating custom daemons and processes on a victim system during post-exploitation?

52 / 93

Which of the following is not true about PowerSploit and Empire?

53 / 93

Which of the following Sysinternals tools would a penetration tester ideally use to execute processes on a compromised host?

54 / 93

What function is served by the PsExec tool in the Sysinternals suite during post-exploitation in penetration testing?

55 / 93

Which of the following statements about the use of PowerSploit and Empire in post-exploitation is correct?

56 / 93

Which post-exploitation module of PowerSploit is used to reflectively load Mimikatz 2.0 using PowerShell?

57 / 93

What is the main use of BloodHound in a Windows Active Directory environment?

58 / 93

Which of the following is NOT a post-exploitation technique performed by PowerSploit?

59 / 93

Which Sysinternals tool allows a penetration tester to interact with executables on a compromised host?

60 / 93

What best describes the use of the Twittor utility according to this text?

61 / 93

What is the primary purpose of the steghide tool in a cyber attack?

62 / 93

What are some ways to maintain persistence in a compromised system according to the CompTIA PenTest+ (PT0-002) study material?

63 / 93

What is the main advantage of using Microsoft’s Remote Desktop Protocol (RDP) in post-exploitation?

64 / 93

What is the function of the ’Invoke-WmiCommand’ in PowerSploit?

65 / 93

What is the main goal of lateral movement, a post-exploitation technique?

66 / 93

What function does the Invoke-CredentialInjection module in PowerSploit serve?

67 / 93

What is a potential post-exploitation action an attacker could perform via PowerShell remoting?

68 / 93

What functionality does the PowerSploit module called ’Invoke-Mimikatz’ provide?

69 / 93

Which of the following statements about Windows Remote Management (WinRM) is incorrect?

70 / 93

What is the term used to refer to the use of legitimate tools to perform post-exploitation activities?

71 / 93

What is the purpose of a C2 (command and control) system in the context of cyber security attacks?

72 / 93

Which of the following C2 utility allows attackers to use Twitter direct messages for command and control?

73 / 93

What is the main goal of the lateral movement post-exploitation technique ?

74 / 93

Which Sysinternals tool can a penetration tester use to change passwords on a compromised system?

75 / 93

What does the Add-Persistence module in PowerSploit do?

76 / 93

What is the main goal of lateral movement in post-exploitation?

77 / 93

What framework is mentioned in the text that offers the ability to run PowerShell agents without the need for powershell.exe?

78 / 93

Which command is used to embed sensitive information within an image file using steghide?

79 / 93

Which feature of the post-exploitation tool Empire is not correctly described based on the provided text?

80 / 93

How can an attacker use the Windows Task Scheduler for post-exploitation?

81 / 93

What is the purpose of the Invoke-ReflectivePE Injection module in PowerSploit?

82 / 93

What is the purpose of Invoke-Mimikatz in PowerSploit?

83 / 93

What is the use of the PowerSploit module ’Invoke-DllInjection’ during post-exploitation?

84 / 93

What is the concept of fileless malware in the context of post-exploitation techniques?

85 / 93

What is the purpose of the Invoke-NinjaCopy PowerSploit module?

86 / 93

Which of the following correctly describes the use of PowerSploit in post-exploitation?

87 / 93

What is the purpose of the ’New-ElevatedPersistence Option’ module in PowerSploit?

88 / 93

What is a covert channel in the context of cyber security?

89 / 93

What purpose does Windows Management Instrumentation (WMI) serve in Post-Exploitation Techniques?

90 / 93

Which PowerSploit module would you use for injecting a DLL into the process ID of your choosing?

91 / 93

What is the primary use of the Empire PowerSploit suite during penetration testing?

92 / 93

What is the role of the Get-VolumeShadowCopy script in PowerSploit?

93 / 93

What is a covert channel in context of performing post-exploitation techniques and command and control systems?

Your score is

Boost Your Skills with Free Anki Flashcards

Click the download button to get the CompTIA Pentest+ Anki deck.

CompTIA Pentest+(pt0-002) Practice test Anki deck image
CompTIA Pentest+ Practice questions Sample image

Master post-exploitation techniques with our CompTIA PenTest+ Chapter 08 practice questions.

This chapter covers maintaining access, data exfiltration, and other post-exploitation methods.
Utilize our free Anki decks to enhance your learning experience.
Visit CompTIA’s website for official exam resources.

Ready to wrap up your study?
Proceed to Chapter 09: Reporting and Communication to learn how to effectively communicate your findings.

 

Explore our other free practice tests:

Share the Post: