Quiz 1 of 0
Exam simulator: Attacks, Threats, and Vulnerabilities – Part B
Anastasia-Instructor August 30, 2022
Time limit: 0
Quiz Summary
0 of 20 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Quiz complete. Results are being recorded.
Results
0 of 20 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Unfortunately, you didn’t pass the quiz, but hey, you have unlimited access.π
Practice makes you perfect! π -
Congratulations! π₯³
You have passed the quiz successfully! You are one step closer to pass the real exam!
We hope to see you again on another certification path.βοΈ
Good luck with the exam! Stay strong.π
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 20
1. Question
A hacker introduced corrupt Domain Name System (DNS) data into a DNS resolverβs cache with the aim of redirecting users either to the wrong websites or to his own computer. What type of DNS attack did the hacker implement in this scenario?
CorrectIncorrect -
Question 2 of 20
2. Question
Which of the following attacks is a Network Layer DDoS attack?
CorrectIncorrect -
Question 3 of 20
3. Question
The type of hackers that violates computer security systems without permission, stealing the data inside for their own personal gain or vandalizing the system is commonly known as:
CorrectIncorrect -
Question 4 of 20
4. Question
A hacker wants to attack a network with the aim of maintaining ongoing access to the targeted network rather than to get in and out as quickly as possible with the ultimate goal of stealing information over a long period of time. What type of attacking technique will the hacker use in this case?
CorrectIncorrect -
Question 5 of 20
5. Question
Which of the following terms refers to Information Technology (IT) applications and infrastructure that are managed and utilized without the knowledge of the enterprise’s IT department?
CorrectIncorrect -
Question 6 of 20
6. Question
Which of the following statements are true regarding Cloud-based security vulnerabilities? (Choose all the apply)
CorrectIncorrect -
Question 7 of 20
7. Question
A zero-day attack is an attack that exploits a potentially serious software security weakness that the vendor or developer may be unaware of.Β (True/False)
CorrectIncorrect -
Question 8 of 20
8. Question
You have set up an Intrusion detection system (IDS) and suddenly the IDS identifies an activity as an attack but the activity is acceptable behavior. The state, in this case, is known as:
CorrectIncorrect -
Question 9 of 20
9. Question
Which of the following options is a dictionary that provides definitions for publicly disclosed cybersecurity vulnerabilities and exposures?
CorrectIncorrect -
Question 10 of 20
10. Question
You have been hired as a penetration tester for a company to locate and exploit vulnerabilities in its targetβs outward-facing services. You are not provided with any architecture diagrams or source code. This means that you are relying on dynamic analysis of currently running programs and systems within the target network.
Which of the following pentesting assignments are you currently on?
CorrectIncorrect -
Question 11 of 20
11. Question
The document that lists out the specifics of your penetration testing project to ensure that both the client and the engineers working on a project know exactly what is being tested when it’s being tested, and how it’s being tested is known as:
CorrectIncorrect -
Question 12 of 20
12. Question
__________ is the first step where hacker gathers as much information as possible to find ways to intrude into a target system or at least decide what type of attacks will be more suitable for the target.
CorrectIncorrect -
Question 13 of 20
13. Question
Which of the following cybersecurity testing exercise team does not focus exclusively on attacking or defending, but they do both?
CorrectIncorrect -
Question 14 of 20
14. Question
The technique of redirecting victims from a current page to a new URL which is usually a phishing page that impersonates a legitimate site and steals credentials from the victims is known as:
CorrectIncorrect -
Question 15 of 20
15. Question
The type of hackers that are experts in compromising computer security systems and use their abilities for good, ethical, and legal purposes rather than bad, unethical, and criminal purposes is commonly known as:
CorrectIncorrect -
Question 16 of 20
16. Question
What type of attack is when an attacker takes over a regular user account on a network and attempts to gain administrative permissions?
CorrectIncorrect -
Question 17 of 20
17. Question
A web developer wants to protect its web application from session hijacking attacks. Which of the following actions should a web developer perform to prevent an attacker from exploiting valid sessions? (Choose all that apply.)
CorrectIncorrect -
Question 18 of 20
18. Question
Your company is using a Web Vulnerability Scanner tool named Acunetic to check whether your website and web applications are vulnerable. While you were reviewing a scan report you saw the following URL:
http://test.webarticles.com/show.asp? view= ../../../../../Windows/system.ini HTTP/1.1
What type of attack is conducted on that website?
CorrectIncorrect -
Question 19 of 20
19. Question
Which of the following options is a dictionary that provides definitions for publicly disclosed cybersecurity vulnerabilities and exposures?
CorrectIncorrect -
Question 20 of 20
20. Question
You have been hired as a penetration tester for conducting an assessment. The company wants to include ONLY cross-site scripting and SQL injection from the list of authorized activities. Which of the following documents would include this limitation?
CorrectIncorrect