Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Test Content Question 1 2 . 5 Points Which of the following is an example of an active attack? Malware Eavesdropping Sniffing Footprinting Question 2

Test Content
Question 1
2.5
Points
Which of the following is an example of an active attack?
Malware
Eavesdropping
Sniffing
Footprinting
Question 2
2.5
Points
Dorks is another name for:
Your younger brother
Search queries
Network vulnerability data
Devices and accessories
Question 3
2.5
Points
Attacks = Motive (Goal)+ Method + which of the following?
Security
Vulnerability
Availability
Skills
Question 4
2.5
Points
Which of the following is a passive footprinting technique?
Searching for digital files
Determining the operating systems in use by the target organization
Extracting DNS information
Gathering website information using web spidering and mirroring tools
Question 5
2.5
Points
Performing complex search queries using advanced search operators to uncover hidden or sensitive information is known as:
Yahoo rodeo
Google hacking
Ba da Bing, ba da boom!
DuckDuckGo going
Question 6
2.5
Points
TTPs refer to which of the following?
Threats, tactics, and protocols
Tactics, techniques, and procedures
Target, techniques, and patterns
Technical, targeted, and proficient
Question 7
2.5
Points
Footprinting refers to the gathering of publicly available information about a target network for the purposes of which of the following?
Assessing risk
Social engineering
Breaching the network
Securing vulnerabilities
Question 8
2.5
Points
A hackers motive might be which of these?
Disrupt the business activities
Learn about the business mission
Help the business expand operations
Access data that should be freely available
Question 9
2.5
Points
Which of the following is an example of a passive attack?
Decryption of weakly encrypted traffic
Malware
Spoofing
Profiling
Question 10
2.5
Points
Which of the following is an active footprinting technique?
Finding the Top-level Domains (TLDs) and sub-domains through web services
Monitoring the target using alert services
Collecting location information through web services
Gathering information through email tracking

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Practical Neo4j

Authors: Gregory Jordan

1st Edition

1484200225, 9781484200223

More Books

Students also viewed these Databases questions

Question

1 Why is job analysis important?

Answered: 1 week ago