Exam 1: Applying Environmental Reconnaissance
Exam 1: Applying Environmental Reconnaissance9 Questions
Exam 2: Analyzing Network Reconnaissance10 Questions
Exam 3: Strengthening the Network10 Questions
Exam 4: Exploring Penetration Testing10 Questions
Exam 5: Scanning for Vulnerabilities10 Questions
Exam 6: Analyzing Vulnerability Scans and Identifying Common Vulnerabilities10 Questions
Exam 7: Reacting to a Cyber Incident: Impact and Forensics10 Questions
Exam 8: Reacting to a Cyber Incident: Communication and Incident Recovery10 Questions
Exam 9: Reacting to a Cyber Incident: Analyzing Common Symptoms10 Questions
Exam 10: Security Structures and Identity and Access Management10 Questions
Exam 11: Defense in Depth, Software Development, and Data Analytics10 Questions
Select questions type
Which of the following is not one of the recognized pairs of network types?
Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
B
Which of the following is not a principle that is exploited in social engineering?
Free
(Multiple Choice)
4.8/5
(26)
Correct Answer:
C
___________________ is the process of gathering information about a person from one or more social media sites to construct a "sketch" of that person.
Free
(Short Answer)
4.9/5
(37)
Correct Answer:
Social media profiling
What is the term for sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information?
(Short Answer)
4.8/5
(34)
Which of the following is not a common use of an automated email harvesting tool?
(Multiple Choice)
4.9/5
(40)
The name of the ______________ tool is an abbreviation for "network mapper."
(Short Answer)
4.7/5
(41)
______________ is a generic term for a range of products that look for different vulnerabilities in networks or systems.
(Short Answer)
5.0/5
(40)
Which of the following is a networking program that tests whether a particular host can be reached?
(Multiple Choice)
4.9/5
(27)
Topology discovery is an attempt to uncover the layout of an internal network, which is a key goal of a threat actor.
(True/False)
4.8/5
(36)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)