IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Ethical HackerWhich tool is an open-source container vulnerability scanner that can be used to find vulnerabilities in a Docker image?ITExamAnswers asked 9 months ago • Ethical HackerWhich tool can be used to perform on-path attacks in BLE implementations?ITExamAnswers asked 9 months ago • Ethical HackerA threat actor has compromised a VM in a data center and discovered a vulnerability that provides access to data in another VM. What type of VM vulnerability has been discovered?ITExamAnswers asked 9 months ago • Ethical HackerWhich option is a characteristic of a VM hypervisor?ITExamAnswers asked 9 months ago • Ethical HackerWhy do cloud architectures help minimize the impact of DoS or DDoS attacks compared to hosting services on-premise?ITExamAnswers asked 9 months ago • Ethical HackerWhich credential harvesting tool could be used to send a spear phishing email with a link to a malicious site to a target victim?ITExamAnswers asked 9 months ago • Ethical HackerWhich tool is a set of open-source analysis tools that uses the ClamAV antivirus engine to help detect vulnerabilities, Trojans, backdoors, and malware in Docker images and containers?ITExamAnswers asked 9 months ago • Ethical HackerA threat actor uploaded a VM with malicious software to the VMware Marketplace. When an organization deploys the VM, the threat actor can manipulate the systems, applications, and user data. What type of VM vulnerability has been enabled?ITExamAnswers asked 9 months ago • Ethical HackerWhich option is a collection of compute interface specifications designed to offer management and monitoring capabilities independently of the CPU, firmware, and operating system of the host?ITExamAnswers asked 9 months ago • Ethical HackerWhich two IoT systems should never be exposed to the Internet? (Choose two.)ITExamAnswers asked 9 months ago • Ethical HackerWhich option is a security vulnerability that affects IoT implementations?ITExamAnswers asked 9 months ago • Ethical HackerMatch the Bluetooth Low Energy (BLE) phase to the description.ITExamAnswers asked 9 months ago • Ethical HackerWhich tool is an open-source framework used to test the security of iOS applications?ITExamAnswers asked 9 months ago • Ethical HackerWhich mobile device vulnerability is targeted when a threat actor reverse engineers a mobile app to see how it creates and stores keys in the iOS Keychain?ITExamAnswers asked 9 months ago • Ethical HackerWhich tool helps software developers and cloud consumers deploy applications in the cloud and use the resources that the cloud provider offers?ITExamAnswers asked 9 months ago • Ethical Hacker