8. Post-Exploitation Techniques

Press the Start button to begin the practice test.

PenTest+ (PT0-002) Chapter 08. Performing Post-Exploitation Techniques

1 / 93

What is the use of Get-MicrophoneAudio module in PowerSploit?

2 / 93

When using PsExec tool as part of Sysinternals suite post-exploitation, what is the key advantage for an attacker?

3 / 93

Which Sysinternals tool can be used by penetration testers to show the open files on a compromised host?

4 / 93

What is the primary purpose of the steghide tool in a cyber attack?

5 / 93

What is the purpose of a C2 (command and control) system in the context of cyber security attacks?

6 / 93

What are some ways to maintain persistence in a compromised system according to the CompTIA PenTest+ (PT0-002) study material?

7 / 93

What does the Mimikatz 2.0 module listed in PowerSploit in Table 8-3 do?

8 / 93

What is the main goal of lateral movement, a post-exploitation technique?

9 / 93

Which of the following statements about Windows Remote Management (WinRM) is incorrect?

10 / 93

How can you use PowerSploit for remote attacks?

11 / 93

Which of the following Sysinternals tools can be used to kill processes on a Windows-based system during a penetration test?

12 / 93

What is the concept of fileless malware in the context of post-exploitation techniques?

13 / 93

What function does the Invoke-CredentialInjection module in PowerSploit serve?

14 / 93

Which of the following statements best describes the difference between a bind shell and a reverse shell?

15 / 93

Which Sysinternals tool allows you to run commands that can reveal information about running processes?

16 / 93

What is the purpose of the Get-VolumeShadowCopy module in PowerSploit?

17 / 93

Which of the following is not true about PowerSploit and Empire?

18 / 93

Which among the following describes how PowerSploit is typically used in post-exploitation techniques?

19 / 93

What is the function of Out-CompressedDll script in the PowerSploit module collection?

20 / 93

What is the purpose of a covert channel in a command and control (C2) system?

21 / 93

Which feature of the post-exploitation tool Empire is not correctly described based on the provided text?

22 / 93

Which of the following statements describes the use of PowerSploit and Empire in post-exploitation techniques?

23 / 93

What is the main goal of lateral movement in the context of post-exploitation techniques?

24 / 93

Which Sysinternals tool allows a penetration tester to interact with executables on a compromised host?

25 / 93

What is the role of Windows Remote Management (WinRM) in post-exploitation techniques?

26 / 93

Which of the following best describes the use of PowerSploit and Empire in a post-exploitation context?

27 / 93

How does an attacker maintain persistent access to compromised systems using Windows Remote Management (WinRM)?

28 / 93

What is the meaning of ’living-off-the-land’ in the context of post-exploitation activities?

29 / 93

What is the purpose of the ’New-ElevatedPersistence Option’ module in PowerSploit?

30 / 93

What is the purpose of Invoke-Mimikatz in PowerSploit?

31 / 93

Which of the following correctly describes the use of PowerSploit in post-exploitation?

32 / 93

Which of the following statements about the use of PowerSploit and Empire in post-exploitation is correct?

33 / 93

Which PowerSploit Module is predominantly used for taking screenshots at regular intervals?

34 / 93

What is the primary role of PowerSploit during the post-exploitation phase of a penetration test?

35 / 93

What is the fundamental difference between a bind shell and a reverse shell?

36 / 93

Which command is used to embed sensitive information within an image file using steghide?

37 / 93

What is a covert channel in the context of cyber security?

38 / 93

Which Sysinternals tool can a penetration tester use to change passwords on a compromised system?

39 / 93

What can be done after compromising a system with root access according to the text?

40 / 93

Which of the following describes the PowerSploit module ’Invoke-Portscan’?

41 / 93

What is the purpose of the ’Set-MasterBootRecord’ module in PowerSploit?

42 / 93

Which of the following is not a function of the PowerSploit post-exploitation PowerShell module?

43 / 93

What is one main use of the Empire post-exploitation framework?

44 / 93

Which of the following is true about PowerSploit and Empire?

45 / 93

What is a characteristic of the PowerShell-based post-exploitation framework, Empire, used in cybersecurity?

46 / 93

What framework is mentioned in the text that offers the ability to run PowerShell agents without the need for powershell.exe?

47 / 93

What is the main advantage of PsExec for attackers during post-exploitation?

48 / 93

What does the Add-Persistence module in PowerSploit do?

49 / 93

What is the purpose of the Out-Minidump module in the PowerSploit post-exploitation toolkit?

50 / 93

What best describes the use of the Twittor utility according to this text?

51 / 93

What is the purpose of using Get-GPPPassword module in PowerSploit?

52 / 93

What is a potential post-exploitation action an attacker could perform via PowerShell remoting?

53 / 93

What is the purpose of the Invoke-NinjaCopy PowerSploit module?

54 / 93

Within the context of post-exploitation techniques, when PowerSploit is used, how is it typically exposed?

55 / 93

Which of the following techniques is NOT used as part of a C2 system?

56 / 93

Which of the following Sysinternals tools could be used to remotely execute commands and view the output on an attacker’s own system?

57 / 93

Which of the following functionalities can NOT be achieved using the Sysinternals suite in a post-exploitation scenario?

58 / 93

Which of the following is NOT a post-exploitation technique performed by PowerSploit?

59 / 93

What function is served by the PsExec tool in the Sysinternals suite during post-exploitation in penetration testing?

60 / 93

What is the main goal of lateral movement in post-exploitation?

61 / 93

What is a key advantage of using the Empire framework for post-exploitation?

62 / 93

What purpose does Windows Management Instrumentation (WMI) serve in Post-Exploitation Techniques?

63 / 93

In the context of post-exploitation penetration testing using Sysinternals and PsExec, what action can PsExec perform?

64 / 93

How can an attacker maintain persistent access to a compromised Windows system using Windows Remote Management (WinRM)?

65 / 93

What is a covert channel in the context of attacking and compromising systems?

66 / 93

What is the main purpose of steghide in the context of penetration testing?

67 / 93

What is a covert channel in the context of Command and Control (C2) in post-exploitation techniques?

68 / 93

Which PowerSploit module would you use for injecting a DLL into the process ID of your choosing?

69 / 93

What is the use of the PowerSploit module ’Invoke-DllInjection’ during post-exploitation?

70 / 93

Which of the following C2 utility allows attackers to use Twitter direct messages for command and control?

71 / 93

What is the main goal of the lateral movement post-exploitation technique ?

72 / 93

What is the function of the ’Invoke-WmiCommand’ in PowerSploit?

73 / 93

How can an attacker use the Windows Task Scheduler for post-exploitation?

74 / 93

Which of the following Sysinternals tools allows you to remotely execute anything that can run on a Windows command prompt?

75 / 93

Which of the following PowerShell commands can be used for post-exploitation tasks to avoid detection by security products and antivirus software by loading a PS1 file from the Internet and executing it on the device?

76 / 93

What is the main advantage of using Microsoft’s Remote Desktop Protocol (RDP) in post-exploitation?

77 / 93

What is the role of Windows Remote Management (WinRM) in post-exploitation activities?

78 / 93

Which of the following describes the use of the PowerSploit module Invoke-Shellcode during post-exploitation?

79 / 93

Which of the following Sysinternals tools would a penetration tester ideally use to execute processes on a compromised host?

80 / 93

Which Sysinternals tool is used to execute anything that can run on a Windows command prompt remotely and modify Windows registry values?

81 / 93

What is the role of the Get-VolumeShadowCopy script in PowerSploit?

82 / 93

What is the purpose of creating custom daemons and processes on a victim system during post-exploitation?

83 / 93

What is a covert channel in context of performing post-exploitation techniques and command and control systems?

84 / 93

What is the term used to refer to the use of legitimate tools to perform post-exploitation activities?

85 / 93

What is the purpose of the Invoke-ReflectivePE Injection module in PowerSploit?

86 / 93

What is the primary use of the Empire PowerSploit suite during penetration testing?

87 / 93

What functionality does the PowerSploit module called ’Invoke-Mimikatz’ provide?

88 / 93

What is the main use of BloodHound in a Windows Active Directory environment?

89 / 93

What is the purpose of the PowerSploit script ’Invoke-Mimikatz’ as stated in the module/script description from Table 8-3?

90 / 93

Which command can an attacker use to enable Windows Remote Management (WinRM) on a Windows system?

91 / 93

Which of the following are components of the Empire post-exploitation framework?

92 / 93

Which of the followings are NOT correct according to the PowerSploit post-exploitation techniques?

93 / 93

Which post-exploitation module of PowerSploit is used to reflectively load Mimikatz 2.0 using PowerShell?

Your score is

Boost Your Skills with Free Anki Flashcards

Click the download button to get the CompTIA Pentest+ Anki deck.

CompTIA Pentest+(pt0-002) Practice test Anki deck image
CompTIA Pentest+ Practice questions Sample image

Master post-exploitation techniques with our CompTIA PenTest+ Chapter 08 practice questions.

This chapter covers maintaining access, data exfiltration, and other post-exploitation methods.
Utilize our free Anki decks to enhance your learning experience.
Visit CompTIA’s website for official exam resources.

Ready to wrap up your study?
Proceed to Chapter 09: Reporting and Communication to learn how to effectively communicate your findings.

 

Explore our other free practice tests:

Share the Post:

Related Posts

RSS  
  • Discover How to Work Remotely and Travel!
    Have you ever dreamed about working from beautiful places like Thailand or Japan, but weren’t sure if it’s possible? I’m here to share my adventures and some tips on how to make working remotely while exploring the world a reality.  Who Am I? My name is Josh, and I’m all about creating helpful content on […]
  • Why Contract Work in IT Can Be a Good Start for Your Career
    Hey buddies! Are you curious about what it’s like to work in IT and cyber security? Well, you’re in luck because today we’re diving into the world of contract work and how it might just be the jumpstart your career needed! Getting Into the World of Contract Work in IT Josh, an expert in IT […]
  • Is Cyber Security a Career That Will Last Forever?
    Hey everyone! Have you ever wondered if choosing a career in cyber security is a good idea for the long haul? Well, let’s dive into this topic with the help of Josh Maor’s insights, and find out why cyber security might just be one of the smartest career choices out there. What Is Cyber Security? […]
IT Course

The Affordable, Hands-On Josh Madakor IT Course that gets Results!

Ready to get started your journey?
Cyber Course

The Affordable, Hands-On Cyber Security that gets Results!

Ready to get started your journey?

JOIN OUR

NEWSLETTER

Sign up for our free newsletters.

by joining 8000+ others in my weekly newsletter 

where you’ll get a dose of my thoughts on self-improvement, career,

and life!