1/3/25, 1:59 AM labclient.labondemand.
com/Instructions/ExamResult/ac8e5691-1832-4758-bc59-b31d7170854a
03: Assisted Lab: Performing Social Engineering using SET
PenTest+ (PT0-002) 2022 Update
10/10
Congratulations, you passed!
Duration: 39 minutes, 26 seconds
Use a script to confirm the existence of /root/.set/payload.exe on Kali Score: 1
When the handler is reported as started, select the Score button to validate this task.
Path found ...
Listener detected ...
Task complete
Use a script to confirm the existence of /var/www/html/acctupd.zip on Kali Score: 1
Select the Score button to validate this task.
Download active ...
Task complete
Check sendmail Score: 1
Select the Score button to validate this task:
Recipient confirmed as jaime@structureality.com ...
Sender confirmed as support@structurealty.com ...
Task complete
Verify listener connection Score: 1
Select the Score button to validate this task:
Handler active ...
Task complete
What is the Computer name displayed by this meterpreter command in the box Score: 1
below?
MS10
Congratulations, you have answered the question correctly.
Which of the following attack types is NOT supported by SET? Score: 1
Arduino-based
Wireless
Spear phishing
SQL Injection
https://labclient.labondemand.com/Instructions/ExamResult/ac8e5691-1832-4758-bc59-b31d7170854a 1/2
1/3/25, 1:59 AM labclient.labondemand.com/Instructions/ExamResult/ac8e5691-1832-4758-bc59-b31d7170854a
Powershell
Congratulations, you have answered the question correctly.
Which security framework does SET use to set up listeners? Score: 1
Arachni
Metasploit
SMTP binder
Maltego
Congratulations, you have answered the question correctly.
The most commonly used features of SET are spear phishing, website spoofing, Score: 1
payload delivery, and mass mailer attacks. True or False?
True
False
Congratulations, you have answered the question correctly.
What is the primary limitation or restriction in compromising a victim through a SET- Score: 1
crafted email and related exploit script/payload?
Client-side security blocking execution
Server keyword filtering
Firewall blocking email messages with attachments
NAT traversal
Congratulations, you have answered the question correctly.
Which of the following are true in regard to using SET? (Select all that apply) Score: 1
SET emails can use spoofed source addresses
SET emails must be from a trusted email domain
SET payloads are allow-listed in most security filters
SET can send messages to a single address or a large group of addresses
SET can send attachments or hyperlinks to malicious scripts or payloads
SET demonstrates the power of combining technology with social engineering
Congratulations, you have answered the question correctly.
https://labclient.labondemand.com/Instructions/ExamResult/ac8e5691-1832-4758-bc59-b31d7170854a 2/2