Author: IT Administrator

7.3.3 Quiz – Cloud, Mobile, and IoT Security Answers

7.3.3 Quiz – Cloud, Mobile, and IoT Security Answers 1. Which term is an essential characteristic of cloud computing as defined in NIST SP 800-145? centralized storage resource pooling reduced bandwidth requirements slow elasticity 2. Which cloud technology attack method involves breaching the infrastructure to gather and steal …

8.3.3 Quiz – Performing Post-Exploitation Techniques Answers

8.3.3 Quiz – Performing Post-Exploitation Techniques Answers 1. Which resource is a Windows utility that combines the old CMD functionality with a new scripting/cmdlet instruction set with built-in system administration functionality? Socat Wsc2 PowerShell Twittor 2. Refer to the exhibit. An attacker opens a port or a listener …

9.5.3 Quiz – Reporting and Communication Answers

9.5.3 Quiz – Reporting and Communication Answers 1. Which industry-standard method has created a catalog of known vulnerabilities that provides a score indicating the severity of a vulnerability? CVSS CVE OWASP WSTG NIST SP 800-115 2. Which vulnerability catalog creates a list of publicly known vulnerabilities, each assigned …

10.3.3 Quiz – Tools and Code Analysis Answers

10.3.3 Quiz – Tools and Code Analysis Answers 1. Which two items are programming logic constructs? (Choose two.) Boolean operators Conditionals Arrays Dictionaries Libraries 2. Which two items are data structures used in programming languages? (Choose two.) Procedures functions Arrays Lists Libraries 3. Which two items can be …

Ethical Hacker: Course Final Exam Answers (Self-Paced)

Ethical Hacker Self-Paced Final Exam Answers – Course Final Exam 1. Which are two best practices used to secure APIs? (Choose two.) use reputable and standard libraries to create the APIs make internal API documentation mandatory discussing company API development (or any other application development) on public forums …