IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Ethical HackerWhich option is a Linux distribution tool for forensic evidence collection?ITExamAnswers asked 10 months ago • Ethical HackerWhich encoding method can secretly exfiltrate confidential data in the payload of DNS packets?ITExamAnswers asked 10 months ago • Ethical HackerWhich tool can be used with Metasploit to maintain stealth and avoid detection from security controls implemented by an organization?ITExamAnswers asked 10 months ago • Ethical HackerWhich option is a PowerShell-based post-exploitation tool that can maintain persistence on a compromised system and run PowerShell agents without the need for powershell.exe?ITExamAnswers asked 10 months ago • Ethical HackerWhich vulnerability scanner tool offers a cloud-based service that performs continuous monitoring, vulnerability management, and compliance checking?ITExamAnswers asked 10 months ago • Ethical HackerWhich popular Linux penetration testing distribution is based on Debian GNU/Linux and has evolved from WHoppiX, WHAX, and BackTrack?ITExamAnswers asked 10 months ago • Ethical HackerWhat is a command-line tool that allows for interactive or non-interactive command execution?ITExamAnswers asked 10 months ago • Ethical HackerWhich passive reconnaissance tool can be used to find information about devices and networks on the Internet?ITExamAnswers asked 10 months ago • Ethical HackerWhich programming language element is a code template that includes initial variables and functions for creating an object?ITExamAnswers asked 10 months ago • Ethical HackerWhich tool organizes query entities within the Entity Palette and calls the search options “transforms”?ITExamAnswers asked 10 months ago • Ethical HackerWhich programming language element is a block of code that can be reused multiple times to execute a specific task?ITExamAnswers asked 10 months ago • Ethical HackerWhich tool is designed to find metadata and hidden information in documents?ITExamAnswers asked 10 months ago • Ethical HackerWhich Linux distribution comes with more than 1900 security penetration testing tools?ITExamAnswers asked 10 months ago • Ethical HackerWhat are two tools that can be used to perform credential attacks? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerWhat are two tools that can be used to perform active reconnaissance? (Choose two.)ITExamAnswers asked 10 months ago • Ethical Hacker