Quiz 1 of 0
Exam simulator: Information Gathering and Vulnerability Scanning
Anastasia-Instructor August 30, 2022
Time limit: 0
Quiz Summary
0 of 15 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Quiz complete. Results are being recorded.
Results
0 of 15 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Unfortunately, you didn’t pass the quiz, but hey, you have unlimited access.π
Practice makes you perfect! π -
Congratulations! π₯³
You have passed the quiz successfully! You are one step closer to pass the real exam!
We hope to see you again on another certification path.βοΈ
Good luck with the exam! Stay strong.π
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 15
1. Question
You have been hired to perform a penetration test on the Acme Corporation’s network. Your first task is to do a port scan to identify open ports on their systems and the services with the version of the software running on those ports. Assuming the network ID of the Acme Corporation is 55.56.0.0/16, which command should you use to complete the first task?
CorrectIncorrect -
Question 2 of 15
2. Question
During the network assessment, you are in the phase of discovering all the active hosts on the network with ID 192.168.5.0/24. Assuming you are working on a Linux environment, which command will list all the active hosts on the network with ID 192.168.5.0/24?
CorrectIncorrect -
Question 3 of 15
3. Question
A malicious user is creating packets manually to carry out attacks and to exploit vulnerabilities in a network with a final goal to penetrate into a networkβs structure. What technique does the hacker use to carry out attacks?
CorrectIncorrect -
Question 4 of 15
4. Question
You have set up an Intrusion detection system (IDS) and suddenly the IDS identifies an activity as an attack but the activity is acceptable behavior. The state, in this case, is known as:
CorrectIncorrect -
Question 5 of 15
5. Question
You have been tasked to recommend a tool that performs a complete vulnerability scan for the Acme corporation’s servers. What tool would you recommend?
CorrectIncorrect -
Question 6 of 15
6. Question
As part of the scanning phase of information gathering, you are looking at discovering systems on the network. Which of the following types of vulnerability scans should you perform to complete the task?
CorrectIncorrect -
Question 7 of 15
7. Question
Which of the following types of vulnerability scans an organization should perform as they store credit card information that follows the Payment Card Industry Data Security Standard (PCI DSS)?
CorrectIncorrect -
Question 8 of 15
8. Question
As part of the scanning phase of information gathering, you are using a combination of Whois lookups and DNS profiling to retrieve and collect information. Which of the following enumeration type are you performing?
CorrectIncorrect -
Question 9 of 15
9. Question
You are performing a black box pentest and would like to discover the hosts that exist on the given network. Assuming you are a beginner penetration tester, what tool would you use?
CorrectIncorrect -
Question 10 of 15
10. Question
You are trying to test if the firewall of the Acme corporation’s network blocks UDP packets that are in the scope of the pentest. What command would you use to craft your own UDP packets and test the firewall?
CorrectIncorrect -
Question 11 of 15
11. Question
Which of the following social engineer attacks the attacker injects malicious code into public web pages of a site with the aim of installing a backdoor Trojan on visitor’s computers?
CorrectIncorrect -
Question 12 of 15
12. Question
An attacker impersonates a delivery driver and waits outside of a building. When an employee gains securityβs approval and opens the door, the attacker asks the employee to hold the door to gain access to the building. What type of social engineering attack the attacker has performed?
CorrectIncorrect -
Question 13 of 15
13. Question
An attacker breaks into a password-protected computer by systematically entering every word in a dictionary as a password. What type of attack does the attacker carry out?
CorrectIncorrect -
Question 14 of 15
14. Question
Which of the following actions should be taken to increase the security of SCADA networks? (Choose all that apply)
CorrectIncorrect -
Question 15 of 15
15. Question
The technique that attacker uses to convince the victim to install software that is a trojan virus, or to run a script that creates a user account for the attacker is known as?
CorrectIncorrect