FlashGenius Logo FlashGenius
Login Sign Up

CompTIA PenTest+ Practice Questions: Attacks and Exploits Domain

Test your CompTIA PenTest+ knowledge with 10 practice questions from the Attacks and Exploits domain. Includes detailed explanations and answers.

CompTIA PenTest+ Practice Questions

Master the Attacks and Exploits Domain

Test your knowledge in the Attacks and Exploits domain with these 10 practice questions. Each question is designed to help you prepare for the CompTIA PenTest+ certification exam with detailed explanations to reinforce your learning.

Question 1

A penetration tester is using a tool to send malformed packets to a network service to discover potential vulnerabilities. What is this technique called?

A) Port Scanning

B) Fuzzing

C) Social Engineering

D) Phishing

Show Answer & Explanation

Correct Answer: B

Explanation: The correct answer is B. Fuzzing involves sending malformed or unexpected inputs to a program to discover vulnerabilities. Option A, Port Scanning, involves scanning a network to find open ports, not sending malformed packets. Option C, Social Engineering, involves manipulating people rather than technical testing. Option D, Phishing, involves tricking users into providing sensitive information, not testing network services.

Question 2

Which of the following is a common indicator of a successful Man-in-the-Middle (MitM) attack?

A) Users experience slow network performance

B) Unauthorized software is installed on the system

C) Sensitive data is intercepted during transmission

D) The system reboots unexpectedly

Show Answer & Explanation

Correct Answer: C

Explanation: A common indication of a successful MitM attack is the interception of sensitive data during transmission. Attackers position themselves between the communicating parties to eavesdrop or alter the communication. Option A is not specific to MitM attacks and could result from various network issues. Option B is more indicative of malware infections. Option D could be a symptom of many issues, such as hardware failures or other types of attacks, but not specifically MitM.

Question 3

A penetration tester is attempting to gain access to a system by exploiting a vulnerability in an outdated protocol that transmits data in plaintext. Which protocol is most likely being targeted?

A) HTTPS

B) SSH

C) Telnet

D) SFTP

Show Answer & Explanation

Correct Answer: C

Explanation: Telnet is an outdated protocol that transmits data, including credentials, in plaintext, making it susceptible to exploitation. Option A, HTTPS, and Option B, SSH, are encrypted protocols. Option D, SFTP, is a secure file transfer protocol that uses SSH for encryption.

Question 4

An attacker uses a compromised host to relay malicious traffic to a target network, masking the original source of the attack. What is this technique known as?

A) Spoofing

B) Pivoting

C) Pharming

D) Tunneling

Show Answer & Explanation

Correct Answer: B

Explanation: Pivoting involves using a compromised host to relay malicious traffic to a target, masking the original source. Spoofing disguises the origin of traffic. Pharming redirects users to fraudulent sites. Tunneling encapsulates one protocol within another.

Question 5

Which attack involves sending a large number of ICMP Echo Request packets to a target with the intention of overwhelming it?

A) Smurf attack

B) Ping of Death

C) SYN flood

D) Teardrop attack

Show Answer & Explanation

Correct Answer: A

Explanation: A Smurf attack involves sending a large number of ICMP Echo Request packets to a target, using the target's IP address as the source IP in the packet headers, causing the target to be overwhelmed by the responses. Option B is incorrect because Ping of Death involves sending malformed packets to crash a system. Option C is incorrect as SYN flood targets the TCP handshake process. Option D is incorrect because a Teardrop attack involves sending fragmented packets that cannot be reassembled properly.

Question 6

What type of attack involves an attacker exploiting a vulnerability in a software application to gain unauthorized access to system resources?

A) Privilege Escalation

B) Buffer Overflow

C) Cross-Site Request Forgery (CSRF)

D) Phishing

Show Answer & Explanation

Correct Answer: B

Explanation: A Buffer Overflow attack involves exploiting a vulnerability in a software application to overwrite the memory of an application, which can lead to unauthorized access to system resources or execution of arbitrary code. Privilege Escalation involves gaining higher access rights, Cross-Site Request Forgery (CSRF) tricks users into executing unwanted actions, and Phishing involves tricking users into revealing information.

Question 7

Which of the following attacks involves an attacker injecting malicious code into a SQL statement via unsanitized input fields?

A) Cross-Site Scripting (XSS)

B) SQL Injection

C) Cross-Site Request Forgery (CSRF)

D) Buffer Overflow

Show Answer & Explanation

Correct Answer: B

Explanation: SQL Injection is a code injection technique that exploits vulnerabilities in an application's software by injecting malicious SQL code into input fields that are not properly sanitized. This can allow attackers to manipulate the database, retrieve sensitive information, or even alter database data. Cross-Site Scripting (XSS) involves injecting scripts into web pages, not SQL queries. Cross-Site Request Forgery (CSRF) tricks users into executing unwanted actions on a different site. Buffer Overflow involves overwriting memory to execute arbitrary code.

Question 8

Which of the following attacks involves an attacker redirecting a domain name to a different IP address?

A) DNS Spoofing

B) ARP Spoofing

C) IP Spoofing

D) Email Spoofing

Show Answer & Explanation

Correct Answer: A

Explanation: DNS Spoofing, also known as DNS Cache Poisoning, involves redirecting a domain name to a different IP address, potentially leading users to malicious websites. ARP Spoofing involves sending fake ARP messages on a local network, IP Spoofing involves sending IP packets from a false source address, and Email Spoofing involves sending emails with a forged sender address.

Question 9

An attacker uses a tool to alter DNS records to redirect traffic from a legitimate website to a fraudulent one. What type of attack is this?

A) DNS Spoofing

B) Pharming

C) Phishing

D) ARP Poisoning

Show Answer & Explanation

Correct Answer: A

Explanation: The correct answer is A. DNS Spoofing involves altering DNS records to redirect traffic from a legitimate site to a malicious one. Option B, Pharming, is similar but generally involves redirecting traffic at a larger scale, often through DNS poisoning. Option C, Phishing, involves tricking users into providing information, not altering DNS records. Option D, ARP Poisoning, involves altering ARP tables to redirect traffic on a local network, not DNS records.

Question 10

Which type of attack involves an attacker gaining access to a network through a compromised device that is already inside the network perimeter?

A) Insider Threat

B) Pivoting

C) Brute Force Attack

D) Social Engineering

Show Answer & Explanation

Correct Answer: B

Explanation: Pivoting involves an attacker using a compromised device within a network to launch attacks on other systems inside the network perimeter. Option A, Insider Threat, involves malicious actions by individuals within the organization but not necessarily using compromised devices. Option C, Brute Force Attack, is a method to crack passwords and does not involve network access through compromised devices. Option D, Social Engineering, involves manipulating individuals to gain information or access but not specifically through compromised devices.

Ready to Accelerate Your CompTIA PenTest+ Preparation?

Join thousands of professionals who are advancing their careers through expert certification preparation with FlashGenius.

  • ✅ Unlimited practice questions across all CompTIA PenTest+ domains
  • ✅ Full-length exam simulations with real-time scoring
  • ✅ AI-powered performance tracking and weak area identification
  • ✅ Personalized study plans with adaptive learning
  • ✅ Mobile-friendly platform for studying anywhere, anytime
  • ✅ Expert explanations and study resources
Start Free Practice Now

Already have an account? Sign in here

About CompTIA PenTest+ Certification

The CompTIA PenTest+ certification validates your expertise in attacks and exploits and other critical domains. Our comprehensive practice questions are carefully crafted to mirror the actual exam experience and help you identify knowledge gaps before test day.

CompTIA PenTest+ PT0-002 Practice Questions