Free CompTIA PenTest+ PT0-002: 08 Post-Exploitation + Anki Flashcards

Ref:📕CompTIA PenTest+ PT0-002 Cert Guide (Certification Guide) 2nd Edition

PenTest+ (PT0-002) Chapter 08. Performing Post-Exploitation Techniques

1 / 93

What can be done after compromising a system with root access according to the text?

2 / 93

What is the main use of BloodHound in a Windows Active Directory environment?

3 / 93

Which of the following statements about Windows Remote Management (WinRM) is incorrect?

4 / 93

What is the use of the PowerSploit module ’Invoke-DllInjection’ during post-exploitation?

5 / 93

What is the purpose of the Invoke-NinjaCopy PowerSploit module?

6 / 93

Which of the following statements best describes the difference between a bind shell and a reverse shell?

7 / 93

What is a covert channel in context of performing post-exploitation techniques and command and control systems?

8 / 93

What is the main goal of lateral movement in the context of post-exploitation techniques?

9 / 93

Which of the following correctly describes the use of PowerSploit in post-exploitation?

10 / 93

How can an attacker use the Windows Task Scheduler for post-exploitation?

11 / 93

What is the purpose of the ’New-ElevatedPersistence Option’ module in PowerSploit?

12 / 93

Which command is used to embed sensitive information within an image file using steghide?

13 / 93

Which post-exploitation module of PowerSploit is used to reflectively load Mimikatz 2.0 using PowerShell?

14 / 93

Which of the following are components of the Empire post-exploitation framework?

15 / 93

Which of the following Sysinternals tools allows you to remotely execute anything that can run on a Windows command prompt?

16 / 93

What is the function of the ’Invoke-WmiCommand’ in PowerSploit?

17 / 93

What is the purpose of the Get-VolumeShadowCopy module in PowerSploit?

18 / 93

When using PsExec tool as part of Sysinternals suite post-exploitation, what is the key advantage for an attacker?

19 / 93

Which of the following is true about PowerSploit and Empire?

20 / 93

What is the primary use of the Empire PowerSploit suite during penetration testing?

21 / 93

In the context of post-exploitation penetration testing using Sysinternals and PsExec, what action can PsExec perform?

22 / 93

Which among the following describes how PowerSploit is typically used in post-exploitation techniques?

23 / 93

Which Sysinternals tool can a penetration tester use to change passwords on a compromised system?

24 / 93

What is the meaning of ’living-off-the-land’ in the context of post-exploitation activities?

25 / 93

Which of the following PowerShell commands can be used for post-exploitation tasks to avoid detection by security products and antivirus software by loading a PS1 file from the Internet and executing it on the device?

26 / 93

Which of the following describes the PowerSploit module ’Invoke-Portscan’?

27 / 93

What functionality does the PowerSploit module called ’Invoke-Mimikatz’ provide?

28 / 93

Which of the following statements about the use of PowerSploit and Empire in post-exploitation is correct?

29 / 93

Which of the following best describes the use of PowerSploit and Empire in a post-exploitation context?

30 / 93

Which of the following functionalities can NOT be achieved using the Sysinternals suite in a post-exploitation scenario?

31 / 93

Which of the following Sysinternals tools can be used to kill processes on a Windows-based system during a penetration test?

32 / 93

Which Sysinternals tool is used to execute anything that can run on a Windows command prompt remotely and modify Windows registry values?

33 / 93

What is the purpose of the Invoke-ReflectivePE Injection module in PowerSploit?

34 / 93

Which Sysinternals tool allows a penetration tester to interact with executables on a compromised host?

35 / 93

Which feature of the post-exploitation tool Empire is not correctly described based on the provided text?

36 / 93

What function does the Invoke-CredentialInjection module in PowerSploit serve?

37 / 93

What is the purpose of the PowerSploit script ’Invoke-Mimikatz’ as stated in the module/script description from Table 8-3?

38 / 93

Which of the following Sysinternals tools would a penetration tester ideally use to execute processes on a compromised host?

39 / 93

Which of the following C2 utility allows attackers to use Twitter direct messages for command and control?

40 / 93

Which of the following is not true about PowerSploit and Empire?

41 / 93

Which PowerSploit Module is predominantly used for taking screenshots at regular intervals?

42 / 93

What are some ways to maintain persistence in a compromised system according to the CompTIA PenTest+ (PT0-002) study material?

43 / 93

What function is served by the PsExec tool in the Sysinternals suite during post-exploitation in penetration testing?

44 / 93

What is one main use of the Empire post-exploitation framework?

45 / 93

What is the purpose of a covert channel in a command and control (C2) system?

46 / 93

What is the purpose of the Out-Minidump module in the PowerSploit post-exploitation toolkit?

47 / 93

What is a covert channel in the context of Command and Control (C2) in post-exploitation techniques?

48 / 93

Which of the followings are NOT correct according to the PowerSploit post-exploitation techniques?

49 / 93

What is the purpose of a C2 (command and control) system in the context of cyber security attacks?

50 / 93

What is the role of Windows Remote Management (WinRM) in post-exploitation techniques?

51 / 93

What is the use of Get-MicrophoneAudio module in PowerSploit?

52 / 93

What does the Add-Persistence module in PowerSploit do?

53 / 93

What is the fundamental difference between a bind shell and a reverse shell?

54 / 93

What is the main advantage of PsExec for attackers during post-exploitation?

55 / 93

Within the context of post-exploitation techniques, when PowerSploit is used, how is it typically exposed?

56 / 93

Which of the following Sysinternals tools could be used to remotely execute commands and view the output on an attacker’s own system?

57 / 93

What is the main goal of lateral movement in post-exploitation?

58 / 93

What is a potential post-exploitation action an attacker could perform via PowerShell remoting?

59 / 93

How can an attacker maintain persistent access to a compromised Windows system using Windows Remote Management (WinRM)?

60 / 93

How does an attacker maintain persistent access to compromised systems using Windows Remote Management (WinRM)?

61 / 93

What is the purpose of using Get-GPPPassword module in PowerSploit?

62 / 93

What is a covert channel in the context of attacking and compromising systems?

63 / 93

How can you use PowerSploit for remote attacks?

64 / 93

What best describes the use of the Twittor utility according to this text?

65 / 93

What is a characteristic of the PowerShell-based post-exploitation framework, Empire, used in cybersecurity?

66 / 93

What is the term used to refer to the use of legitimate tools to perform post-exploitation activities?

67 / 93

Which of the following statements describes the use of PowerSploit and Empire in post-exploitation techniques?

68 / 93

What is the main goal of lateral movement, a post-exploitation technique?

69 / 93

What is the function of Out-CompressedDll script in the PowerSploit module collection?

70 / 93

What is the primary role of PowerSploit during the post-exploitation phase of a penetration test?

71 / 93

Which Sysinternals tool allows you to run commands that can reveal information about running processes?

72 / 93

What is the main goal of the lateral movement post-exploitation technique ?

73 / 93

What is a covert channel in the context of cyber security?

74 / 93

Which command can an attacker use to enable Windows Remote Management (WinRM) on a Windows system?

75 / 93

What is the role of the Get-VolumeShadowCopy script in PowerSploit?

76 / 93

Which of the following is NOT a post-exploitation technique performed by PowerSploit?

77 / 93

Which Sysinternals tool can be used by penetration testers to show the open files on a compromised host?

78 / 93

What is the concept of fileless malware in the context of post-exploitation techniques?

79 / 93

Which of the following is not a function of the PowerSploit post-exploitation PowerShell module?

80 / 93

What is the role of Windows Remote Management (WinRM) in post-exploitation activities?

81 / 93

What does the Mimikatz 2.0 module listed in PowerSploit in Table 8-3 do?

82 / 93

What framework is mentioned in the text that offers the ability to run PowerShell agents without the need for powershell.exe?

83 / 93

What is the main purpose of steghide in the context of penetration testing?

84 / 93

What is the purpose of the ’Set-MasterBootRecord’ module in PowerSploit?

85 / 93

What is the main advantage of using Microsoft’s Remote Desktop Protocol (RDP) in post-exploitation?

86 / 93

What is the primary purpose of the steghide tool in a cyber attack?

87 / 93

Which PowerSploit module would you use for injecting a DLL into the process ID of your choosing?

88 / 93

Which of the following techniques is NOT used as part of a C2 system?

89 / 93

What is the purpose of creating custom daemons and processes on a victim system during post-exploitation?

90 / 93

Which of the following describes the use of the PowerSploit module Invoke-Shellcode during post-exploitation?

91 / 93

What is a key advantage of using the Empire framework for post-exploitation?

92 / 93

What purpose does Windows Management Instrumentation (WMI) serve in Post-Exploitation Techniques?

93 / 93

What is the purpose of Invoke-Mimikatz in PowerSploit?

Your score is

Share the Post:

Download Your FREE CompTIA PenTest+(PT0-002) Anki Deck!

Email issues? [ [email protected] ]

Share the Post:

Master post-exploitation techniques with our CompTIA PenTest+ Chapter 08 practice questions.

This chapter covers maintaining access, data exfiltration, and other post-exploitation methods.
Utilize our Free Anki decks to enhance your learning experience.
Visit CompTIA’s website for official exam resources.

Ready to wrap up your study?
Proceed to Chapter 09: Reporting and Communication to learn how to effectively communicate your findings.

Related Posts

RSS  
  • WGU Master’s Degree Rankings 2026 | I Asked 3 AIs 300 Times to Find the Best One
    Table of Contents Which WGU Master’s Degree Is Actually Worth It? If you’re considering a master’s degree from WGU and can’t figure out which program to choose — cybersecurity, software engineering, AI/ML, data analytics — you’re not alone. The options are overwhelming, and most comparisons online are either outdated or purely opinion-based. So here’s a […]
  • How I Made $1.3 Million in Cybersecurity (With Exact Revenue Numbers)
    Table of Contents If you’re stuck at $50K–$100K and wondering, “How the hell do people make seven figures?” this is for you.I’m Josh Madakor. In 2025, I made $1.3 million in cybersecurity. Not from a corporate job. Not from VC funding. And definitely not from selling a bullshit course.In this article, I’ll break down everything: […]
  • The Best Laptops for Cyber Security in 2026: Stop Over-Analyzing, Start Building
    Table of Contents Let’s be real: most people think that to get into cyber security, you need to be a “super elite hacker” running 10 different virtual machines on a glowing, heavy-duty gaming laptop. Spoiler alert: That’s just not how the industry works. I’ve spent years in roles ranging from Senior Analyst to Security Engineer, […]