Question 1 . ……………is the method of elevating privileges and gain additional acce
ID: 3693106 • Letter: Q
Question
Question 1 . ……………is the method of elevating privileges and gain additional access once access has been gained to a system
A- Escalating privileges
B- Applying software patches
C- Passive reconnaissance
D- Denial of service attack
Question 2 all but --------- are negative aspects of manual testing
A- costly
B-deductive
C- Intrusive
D-disruptive
Question 3 Which one of the following is not considered as a passive reconnaissance
A- finding physical location of a company
B-locating access points that can be used to launch a physical attack
C- perform tests to figure out the IP address of routers and firewalls
D- Identifying an employee associated information from badges
Question 4 Which technique cannot be used by an experienced attacker to cover his/her track
A- Steganography alternate data stream (ads)
B- tunneling
C- using the admin password remotely
Question 5 The placement of more protection is the fundamental principle of …….
A- creating security policy statements
B- detectileast privilege
Question 6 Which one of the following is a formal penetration testing methodology that cannot be followed by an organization during pre-attack phase.
A- defining scope of assessment
B- restoring compromised systems
C- vulnerability mapping
D- Information gathering
Question 7 . ----------- can be used to exploit vulnerabilities during penetration testing
A- nmap
B- metasploit
C- snort
D- honeypot
Question 8 these tips are critical to having a secure infrastructure except
A- network access-least
B-prevention/detection
C- system regular check
D- test patches
Question 9 end point security automated tools include -------------- except
A- remote-access
B- personal firewall
C- anti-virus
D- host IDS/IPS
Question 10 ----------- is a good practice to prevent several vulnerabilities
A - check control panel
B- configure network access-least
C- run dedicated server
D- run multiple servers
Explanation / Answer
1) A i.e Escalating privileges
2) A costly
3) A i.e. finding location of a company
4) C i.e using the admin password remotely
5) B i.e detect least privilege
6) A defining scope of assessment
7) B i.e metasploit
8) C system regular check
9) C anti virus software
10) B configure network access least
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.