8. Post-Exploitation Techniques

Press the Start button to begin the practice test.

PenTest+ (PT0-002) Chapter 08. Performing Post-Exploitation Techniques

1 / 93

What is the purpose of creating custom daemons and processes on a victim system during post-exploitation?

2 / 93

What are some ways to maintain persistence in a compromised system according to the CompTIA PenTest+ (PT0-002) study material?

3 / 93

What is the role of Windows Remote Management (WinRM) in post-exploitation activities?

4 / 93

What is a covert channel in the context of cyber security?

5 / 93

Which of the following Sysinternals tools could be used to remotely execute commands and view the output on an attacker’s own system?

6 / 93

Which of the following describes the PowerSploit module ’Invoke-Portscan’?

7 / 93

What is the main goal of the lateral movement post-exploitation technique ?

8 / 93

Which of the following best describes the use of PowerSploit and Empire in a post-exploitation context?

9 / 93

What does the Add-Persistence module in PowerSploit do?

10 / 93

What is the purpose of a covert channel in a command and control (C2) system?

11 / 93

Which of the following Sysinternals tools can be used to kill processes on a Windows-based system during a penetration test?

12 / 93

What is the main purpose of steghide in the context of penetration testing?

13 / 93

Which Sysinternals tool is used to execute anything that can run on a Windows command prompt remotely and modify Windows registry values?

14 / 93

Which of the following functionalities can NOT be achieved using the Sysinternals suite in a post-exploitation scenario?

15 / 93

What is the role of Windows Remote Management (WinRM) in post-exploitation techniques?

16 / 93

What is the purpose of the ’New-ElevatedPersistence Option’ module in PowerSploit?

17 / 93

What framework is mentioned in the text that offers the ability to run PowerShell agents without the need for powershell.exe?

18 / 93

What is the purpose of Invoke-Mimikatz in PowerSploit?

19 / 93

Which of the following Sysinternals tools allows you to remotely execute anything that can run on a Windows command prompt?

20 / 93

Which of the following statements best describes the difference between a bind shell and a reverse shell?

21 / 93

Which of the following C2 utility allows attackers to use Twitter direct messages for command and control?

22 / 93

Which of the following describes the use of the PowerSploit module Invoke-Shellcode during post-exploitation?

23 / 93

Which of the following techniques is NOT used as part of a C2 system?

24 / 93

What is the main goal of lateral movement, a post-exploitation technique?

25 / 93

What is the role of the Get-VolumeShadowCopy script in PowerSploit?

26 / 93

Which among the following describes how PowerSploit is typically used in post-exploitation techniques?

27 / 93

Which of the following is not true about PowerSploit and Empire?

28 / 93

Which post-exploitation module of PowerSploit is used to reflectively load Mimikatz 2.0 using PowerShell?

29 / 93

Which of the following statements about Windows Remote Management (WinRM) is incorrect?

30 / 93

Which Sysinternals tool can be used by penetration testers to show the open files on a compromised host?

31 / 93

In the context of post-exploitation penetration testing using Sysinternals and PsExec, what action can PsExec perform?

32 / 93

How does an attacker maintain persistent access to compromised systems using Windows Remote Management (WinRM)?

33 / 93

What is the purpose of the ’Set-MasterBootRecord’ module in PowerSploit?

34 / 93

What is the main advantage of PsExec for attackers during post-exploitation?

35 / 93

What is one main use of the Empire post-exploitation framework?

36 / 93

What is the fundamental difference between a bind shell and a reverse shell?

37 / 93

Which Sysinternals tool allows a penetration tester to interact with executables on a compromised host?

38 / 93

Which Sysinternals tool allows you to run commands that can reveal information about running processes?

39 / 93

What is a covert channel in the context of Command and Control (C2) in post-exploitation techniques?

40 / 93

What purpose does Windows Management Instrumentation (WMI) serve in Post-Exploitation Techniques?

41 / 93

Which command can an attacker use to enable Windows Remote Management (WinRM) on a Windows system?

42 / 93

What is the primary use of the Empire PowerSploit suite during penetration testing?

43 / 93

Which of the following statements about the use of PowerSploit and Empire in post-exploitation is correct?

44 / 93

What is a characteristic of the PowerShell-based post-exploitation framework, Empire, used in cybersecurity?

45 / 93

Which of the following is true about PowerSploit and Empire?

46 / 93

What functionality does the PowerSploit module called ’Invoke-Mimikatz’ provide?

47 / 93

What is the main goal of lateral movement in the context of post-exploitation techniques?

48 / 93

What is the term used to refer to the use of legitimate tools to perform post-exploitation activities?

49 / 93

Which of the followings are NOT correct according to the PowerSploit post-exploitation techniques?

50 / 93

What is the purpose of the Out-Minidump module in the PowerSploit post-exploitation toolkit?

51 / 93

How can an attacker use the Windows Task Scheduler for post-exploitation?

52 / 93

How can an attacker maintain persistent access to a compromised Windows system using Windows Remote Management (WinRM)?

53 / 93

Which of the following statements describes the use of PowerSploit and Empire in post-exploitation techniques?

54 / 93

What is the purpose of the Invoke-NinjaCopy PowerSploit module?

55 / 93

What is the function of the ’Invoke-WmiCommand’ in PowerSploit?

56 / 93

What is the meaning of ’living-off-the-land’ in the context of post-exploitation activities?

57 / 93

How can you use PowerSploit for remote attacks?

58 / 93

What is a covert channel in context of performing post-exploitation techniques and command and control systems?

59 / 93

What is the function of Out-CompressedDll script in the PowerSploit module collection?

60 / 93

What is a key advantage of using the Empire framework for post-exploitation?

61 / 93

Which PowerSploit module would you use for injecting a DLL into the process ID of your choosing?

62 / 93

Which PowerSploit Module is predominantly used for taking screenshots at regular intervals?

63 / 93

When using PsExec tool as part of Sysinternals suite post-exploitation, what is the key advantage for an attacker?

64 / 93

What is the use of the PowerSploit module ’Invoke-DllInjection’ during post-exploitation?

65 / 93

Within the context of post-exploitation techniques, when PowerSploit is used, how is it typically exposed?

66 / 93

What is the purpose of using Get-GPPPassword module in PowerSploit?

67 / 93

What is the primary purpose of the steghide tool in a cyber attack?

68 / 93

What function does the Invoke-CredentialInjection module in PowerSploit serve?

69 / 93

Which Sysinternals tool can a penetration tester use to change passwords on a compromised system?

70 / 93

What does the Mimikatz 2.0 module listed in PowerSploit in Table 8-3 do?

71 / 93

What is the use of Get-MicrophoneAudio module in PowerSploit?

72 / 93

Which command is used to embed sensitive information within an image file using steghide?

73 / 93

Which of the following Sysinternals tools would a penetration tester ideally use to execute processes on a compromised host?

74 / 93

What is the concept of fileless malware in the context of post-exploitation techniques?

75 / 93

What is the purpose of the PowerSploit script ’Invoke-Mimikatz’ as stated in the module/script description from Table 8-3?

76 / 93

What is a potential post-exploitation action an attacker could perform via PowerShell remoting?

77 / 93

What is the primary role of PowerSploit during the post-exploitation phase of a penetration test?

78 / 93

Which of the following are components of the Empire post-exploitation framework?

79 / 93

Which of the following PowerShell commands can be used for post-exploitation tasks to avoid detection by security products and antivirus software by loading a PS1 file from the Internet and executing it on the device?

80 / 93

What is a covert channel in the context of attacking and compromising systems?

81 / 93

Which of the following correctly describes the use of PowerSploit in post-exploitation?

82 / 93

What is the purpose of the Invoke-ReflectivePE Injection module in PowerSploit?

83 / 93

What is the main advantage of using Microsoft’s Remote Desktop Protocol (RDP) in post-exploitation?

84 / 93

What is the purpose of the Get-VolumeShadowCopy module in PowerSploit?

85 / 93

What is the purpose of a C2 (command and control) system in the context of cyber security attacks?

86 / 93

Which of the following is NOT a post-exploitation technique performed by PowerSploit?

87 / 93

What is the main goal of lateral movement in post-exploitation?

88 / 93

Which of the following is not a function of the PowerSploit post-exploitation PowerShell module?

89 / 93

What function is served by the PsExec tool in the Sysinternals suite during post-exploitation in penetration testing?

90 / 93

What is the main use of BloodHound in a Windows Active Directory environment?

91 / 93

Which feature of the post-exploitation tool Empire is not correctly described based on the provided text?

92 / 93

What can be done after compromising a system with root access according to the text?

93 / 93

What best describes the use of the Twittor utility according to this text?

Your score is

Boost Your Skills with Free Anki Flashcards

Click the download button to get the CompTIA Pentest+ Anki deck.

CompTIA Pentest+(pt0-002) Practice test Anki deck image
CompTIA Pentest+ Practice questions Sample image

Master post-exploitation techniques with our CompTIA PenTest+ Chapter 08 practice questions.

This chapter covers maintaining access, data exfiltration, and other post-exploitation methods.
Utilize our free Anki decks to enhance your learning experience.
Visit CompTIA’s website for official exam resources.

Ready to wrap up your study?
Proceed to Chapter 09: Reporting and Communication to learn how to effectively communicate your findings.

 

Explore our other free practice tests:

Share the Post:

Related Posts

RSS  
  • Discover How to Work Remotely and Travel!
    Have you ever dreamed about working from beautiful places like Thailand or Japan, but weren’t sure if it’s possible? I’m here to share my adventures and some tips on how to make working remotely while exploring the world a reality.  Who Am I? My name is Josh, and I’m all about creating helpful content on […]
  • Why Contract Work in IT Can Be a Good Start for Your Career
    Hey buddies! Are you curious about what it’s like to work in IT and cyber security? Well, you’re in luck because today we’re diving into the world of contract work and how it might just be the jumpstart your career needed! Getting Into the World of Contract Work in IT Josh, an expert in IT […]
  • Is Cyber Security a Career That Will Last Forever?
    Hey everyone! Have you ever wondered if choosing a career in cyber security is a good idea for the long haul? Well, let’s dive into this topic with the help of Josh Maor’s insights, and find out why cyber security might just be one of the smartest career choices out there. What Is Cyber Security? […]

JOIN OUR

NEWSLETTER

Sign up for our free newsletters.

by joining 8000+ others in my weekly newsletter 

where you’ll get a dose of my thoughts on self-improvement, career,

and life!