exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 382 discussion

Actual exam question from CompTIA's PT0-002
Question #: 382
Topic #: 1
[All PT0-002 Questions]

Which of the following best explains why a penetration tester would use ProxyChains during an assessment?

  • A. To harvest credentials
  • B. To use remote access tools
  • C. To fingerprint the organization
  • D. To automate protocols
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
BlackSkullz
5 months, 3 weeks ago
Selected Answer: B
Remote access is a continuous stream of data. ProxyChains has a "dynamic" option which would allow the stream to continue should one of the proxy servers go down or get blocked, as it would fall back to another proxy server within the chain of proxies configured by the tester. This ensures the integrity and persistence of the remote access connection while also masking the tester's actual IP address
upvoted 1 times
...
IamBlackFire
6 months, 3 weeks ago
If we didn’t agree on a gray- or white-box model and our IPs were not whitelisted, what can we do to bypass those limitations which are regulated by the customer and their firewall? Here, we can see only one possibility to evade those limitations: by switching both our IP address and user-agent. Fingerprint could be right.
upvoted 1 times
...
JRocmon
7 months, 1 week ago
Selected Answer: B
ProxyChains is commonly used during a penetration testing assessment to achieve remote access by masking the source of network traffic, allowing an attacker to pivot through a compromised system within a network and access other internal hosts that might otherwise be unreachable directly from the internet; essentially enabling "remote access" through a chain of proxy servers while obscuring their origin.
upvoted 4 times
...
CEH_2024
7 months, 3 weeks ago
B : B. To use remote access tools Explanation: ProxyChains is a tool used to route network traffic through a series of proxies (such as Tor, SOCKS proxies, or other anonymous services) to mask the tester's IP address and bypass firewalls or network restrictions during an assessment. This is particularly useful when using remote access tools to connect to a target while maintaining anonymity or bypassing network filters.
upvoted 2 times
...
CEH_2024
7 months, 3 weeks ago
C : B. To use remote access tools Explanation: ProxyChains is a tool used to route network traffic through a series of proxies (such as Tor, SOCKS proxies, or other anonymous services) to mask the tester's IP address and bypass firewalls or network restrictions during an assessment. This is particularly useful when using remote access tools to connect to a target while maintaining anonymity or bypassing network filters.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago