0% found this document useful (0 votes)
41 views3 pages

Lab 4

The document is an exam result for the Security+ (Exam SY0-701) focused on using the Social Engineering Toolkit (SET). The user passed the exam with a duration of 33 minutes and answered multiple questions correctly regarding attack types, defense mechanisms, and features of SET. It includes specific tasks completed during the exam related to confirming file existence and verifying listener connections.

Uploaded by

elissajane2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views3 pages

Lab 4

The document is an exam result for the Security+ (Exam SY0-701) focused on using the Social Engineering Toolkit (SET). The user passed the exam with a duration of 33 minutes and answered multiple questions correctly regarding attack types, defense mechanisms, and features of SET. It includes specific tasks completed during the exam related to confirming file existence and verifying listener connections.

Uploaded by

elissajane2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

12/11/24, 8:52 AM labclient.labondemand.

com/Instructions/ExamResult/a9362e39-82d3-40df-b035-94af92465af1

04: Assisted - Using SET to perform social engineering


Security+ (Exam SY0-701)

11/11
Congratulations, you passed!
Duration: 33 minutes, 29 seconds

 Which of the following attack types is NOT supported by SET? Score: 1

Arduino-based
Wireless
Spear phishing
SQL Injection
Powershell
Congratulations, you have answered the question correctly.

 Use a script to confirm the existence of /root/.set/payload.exe on Kali Score: 1


When the handler is reported as started, select the Score button to validate this task.
Path found ...
Listener detected ...
Task complete

 Use a script to confirm the existence of /var/www/html/acctupd.zip on Score: 1


Kali
Select the Score button to validate this task:
Download active ...
Task complete

 Check sendmail Score: 1


Select the Score button to validate this task:
Recipient confirmed as [email protected] ...
Sender confirmed as [email protected] ...
Task complete

 Verify listener connection Score: 1


Select the Score button to validate this task:
Handler active ...
Task complete
https://labclient.labondemand.com/Instructions/ExamResult/a9362e39-82d3-40df-b035-94af92465af1 1/3
12/11/24, 8:52 AM labclient.labondemand.com/Instructions/ExamResult/a9362e39-82d3-40df-b035-94af92465af1

 What is the Computer name displayed by this meterpreter command in the Score: 1
box below?

MS10

Congratulations, you have answered the question correctly.

 What is the primary defense against the attack that you performed in this Score: 1
lab?
Do not execute files from email
Updating malware scanners
Implement biometrics
Update the SPAM filter
Congratulations, you have answered the question correctly.

 Which security framework does SET use to set up listeners? Score: 1

Arachni
Metasploit
SMTP binder
Maltego

Congratulations, you have answered the question correctly.

 The most commonly used features of SET are spear phishing, website Score: 1
spoofing, payload delivery, and mass mailer attacks. True or False?

True
False

Congratulations, you have answered the question correctly.

 What is the primary limitation or restriction in compromising a victim through Score: 1


a SET-crafted email and related exploit script/payload?

Client-side security blocking execution


Server keyword filtering
Firewall blocking email messages with attachments
NAT traversal

Congratulations, you have answered the question correctly.

 Which of the following are true in regard to using SET? (Select all that apply) Score: 1

SET emails can use spoofed source addresses


SET emails must be from a trusted email domain
SET payloads are allow-listed in most security filters
https://labclient.labondemand.com/Instructions/ExamResult/a9362e39-82d3-40df-b035-94af92465af1 2/3
12/11/24, 8:52 AM labclient.labondemand.com/Instructions/ExamResult/a9362e39-82d3-40df-b035-94af92465af1

SET can send messages to a single address or a large group of addresses


SET can send attachments or hyperlinks to malicious scripts or payloads
SET demonstrates the power of combining technology with social engineering

Congratulations, you have answered the question correctly.

https://labclient.labondemand.com/Instructions/ExamResult/a9362e39-82d3-40df-b035-94af92465af1 3/3

You might also like