100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

eJPT (eLearnSecurity Junior Penetration Tester) Certification Practice Exam (100 Questions)

Puntuación
-
Vendido
-
Páginas
32
Grado
A+
Subido en
18-01-2026
Escrito en
2025/2026

eJPT (eLearnSecurity Junior Penetration Tester) Certification Practice Exam (100 Questions)

Institución
Engineering Technology
Grado
Engineering technology











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Engineering technology
Grado
Engineering technology

Información del documento

Subido en
18 de enero de 2026
Número de páginas
32
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

  • ejpt

Vista previa del contenido

eJPT (eLearnSecurity Junior Penetration Tester) Certification
Practice Exam (100 Questions)


1. During the reconnaissance phase, which tool would be MOST appropriate for identifying
live hosts on a network?

A) Nmap

B) John the Ripper

C) Wireshark

D) Metasploit

**ANSWER: A**

**EXPLANATION:** Nmap is the standard tool for host discovery and network scanning,
using techniques like ICMP echo requests, TCP SYN scans, and ARP discovery to identify
live hosts.



2. What does the "-sS" flag indicate when running an Nmap scan?

A) Service version detection

B) TCP SYN stealth scan

C) UDP scan

D) OS fingerprinting

**ANSWER: B**

**EXPLANATION:** The "-sS" flag in Nmap performs a TCP SYN scan, also known as a half-
open scan, which sends SYN packets and analyzes responses to determine port status
without completing the TCP handshake.



3. Which HTTP method is typically used to retrieve data from a web server?

A) POST

B) GET

,C) PUT

D) DELETE

**ANSWER: B**

**EXPLANATION:** The GET method is used to request data from a specified resource and
should only retrieve data without causing side effects on the server.



4. During a penetration test, you discover a web application with a URL parameter:
`http://target.com/view.php?id=45`. What type of vulnerability should you test for FIRST?

A) Cross-Site Scripting (XSS)

B) SQL Injection

C) Directory Traversal

D) File Inclusion

**ANSWER: B**

**EXPLANATION:** The "id" parameter in the URL suggests database interaction, making
SQL Injection the most likely vulnerability to test for initially.



5. What is the primary purpose of a reverse shell?

A) To establish an encrypted tunnel

B) To bypass firewall restrictions by having the target connect back to the attacker

C) To escalate privileges on the local system

D) To sniff network traffic

**ANSWER: B**

**EXPLANATION:** A reverse shell initiates a connection from the compromised system
back to the attacker's machine, often bypassing outbound firewall restrictions that might
block incoming connections.



6. Which command would you use to save the output of an Nmap scan to a file in XML
format?

,A) `nmap -oX scan.xml target`

B) `nmap -oN scan.txt target`

C) `nmap -oS scan.txt target`

D) `nmap --output scan.xml target`

**ANSWER: A**

**EXPLANATION:** The `-oX` flag in Nmap outputs results in XML format, which can be
parsed by other tools or imported into vulnerability management systems.



7. When analyzing a packet capture in Wireshark, what filter would show only HTTP traffic?

A) `tcp.port == 80`

B) `http`

C) `tcp.port == 443`

D) Both A and B

**ANSWER: D**

**EXPLANATION:** Both `tcp.port == 80` (standard HTTP port) and the `http` display filter
will show HTTP traffic in Wireshark.



8. What does the following Nmap command do? `nmap -sV -O 192.168.1.0/24`

A) Performs a SYN scan on the network range

B) Performs service version detection and OS fingerprinting on the entire subnet

C) Scans only UDP ports on the network

D) Performs a ping sweep only

**ANSWER: B**

**EXPLANATION:** The `-sV` flag enables service/version detection, `-O` enables OS
detection, and `192.168.1.0/24` specifies the entire Class C subnet.



9. Which of the following is a characteristic of a successful TCP three-way handshake?

, A) SYN → SYN-ACK → ACK

B) SYN → ACK → SYN-ACK

C) ACK → SYN → SYN-ACK

D) SYN → RST → ACK

**ANSWER: A**

**EXPLANATION:** A proper TCP three-way handshake consists of: 1) Client sends SYN, 2)
Server responds with SYN-ACK, 3) Client sends ACK.



10. During information gathering, you use `whois` on a domain. What type of information
are you MOST likely to obtain?

A) Open ports on the domain's servers

B) Domain registration details and contact information

C) Subdomains associated with the domain

D) Web application vulnerabilities

**ANSWER: B**

**EXPLANATION:** The `whois` command queries domain registration databases to
obtain information about domain owners, registration dates, contact details, and name
servers.



11. What is the purpose of using `nc -lvp 4444` during a penetration test?

A) To scan for open ports

B) To set up a netcat listener on port 4444

C) To connect to a remote host on port 4444

D) To capture network traffic

**ANSWER: B**

**EXPLANATION:** `nc -lvp 4444` starts netcat in listen mode (`-l`), verbose mode (`-v`),
on port 4444 (`-p 4444`), waiting for incoming connections, commonly used for reverse
shells.
$128.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
QUANKADA Liberty University
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
315
Miembro desde
4 año
Número de seguidores
249
Documentos
3878
Última venta
2 semanas hace
Professionalacademictutor

On this page, you find all documents, package deals, and flashcards offered by seller

3.8

43 reseñas

5
25
4
4
3
2
2
6
1
6

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes