IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Ethical HackerWhat are three examples of the items a penetration tester must clean from systems as part of the post-engagement cleanup process? (Choose three.)ITExamAnswers asked 10 months ago • Ethical HackerA security audit for a company recommends that the company implement multifactor authentication for the datacenter access. Which solution would achieve the goal?ITExamAnswers asked 10 months ago • Ethical HackerThe IT security department of a company has developed an access policy for the datacenter. The policy specifies that the datacenter is locked between 5:30 pm through 7:45 am daily except for emergency access approved by the IT manager. What is the operational control implemented?ITExamAnswers asked 10 months ago • Ethical HackerA company hires a professional to perform penetration testing. The tester has identified and verified that one web application is vulnerable to SQL injection and cross-site scripting attacks. Which technical control measure should the tester recommend to the company?ITExamAnswers asked 10 months ago • Ethical HackerWhy is it important to use Common Vulnerability Scoring System (CVSS) to reference the ratings of vulnerabilities identified when preparing the final penetration testing report?ITExamAnswers asked 10 months ago • Ethical HackerWhich two options are PowerSploit modules/scripts? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerWhich two tools can create a remote connection with a compromised system? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerMatch the PowerSploit module/script to the respective description.ITExamAnswers asked 10 months ago • Ethical HackerRefer to the exhibit. The attacking system has a listener (port open), and the victim initiates a connection back to the attacking system. Which two resources can create this type of malicious activity? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerWhich C2 utility can be used to create multiple reverse shells?ITExamAnswers asked 10 months ago • Ethical HackerMatch the insecure code practice to the description.ITExamAnswers asked 10 months ago • Ethical HackerWhich two Bluetooth Low Energy (BLE) statements are true? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerMatch the mobile device attack to the description.ITExamAnswers asked 10 months ago • Ethical HackerMatch the mobile device security testing tool to the description.ITExamAnswers asked 10 months ago • Ethical HackerWhat is the purpose of using the smtp-user-enum -M VRFY -u snp -t 10.0.0.1 command in Kali Linux?ITExamAnswers asked 10 months ago • Ethical Hacker