IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Ethical HackerWhat characterizes a partially known environment penetration test?ITExamAnswers asked 10 months ago • Ethical HackerWhat is the purpose of bug bounty programs used by companies?ITExamAnswers asked 10 months ago • Ethical HackerWhen conducting an application-based penetration test on a web application, the assessment should also include testing access to which resources?ITExamAnswers asked 10 months ago • Ethical HackerWhat two resources are evaluated by a network infrastructure penetration test? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerWhat kind of security weakness is evaluated by application-based penetration tests?ITExamAnswers asked 10 months ago • Ethical HackerWhat is an insider threat attack?ITExamAnswers asked 10 months ago • Ethical HackerWhat is a state-sponsored attack?ITExamAnswers asked 10 months ago • Ethical HackerWhich type of threat actor uses cybercrime to steal sensitive data and reveal it publicly to embarrass a target?ITExamAnswers asked 10 months ago • Ethical HackerWhich threat actor term describes a well-funded and motivated group that will use the latest attack techniques for financial gain?ITExamAnswers asked 10 months ago • Ethical HackerWhich statement best describes the term ethical hacker?ITExamAnswers asked 10 months ago • Ethical HackerA company hires a cybersecurity consultant to perform penetration tests. What is the key difference between unknown-environment testing and known-environment testing?ITExamAnswers asked 10 months ago • Ethical HackerA company hires a cybersecurity consultant to perform penetration tests. The consultant is discussing with the company about the penetration testing strategy. Which statement describes the term unknown-environment testing?ITExamAnswers asked 10 months ago • Ethical HackerA company hires a cybersecurity consultant to perform penetration tests. The consultant is working with the company to set up communication procedures. Which two protocols should be considered for exchanging emails securely? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerA company hires a cybersecurity consultant to perform penetration tests. What should be the consultant’s first step in validating the engagement scope?ITExamAnswers asked 10 months ago • Ethical HackerA company hires a cybersecurity consultant to perform penetration tests. What can cause scope creep of the engagement?ITExamAnswers asked 10 months ago • Ethical Hacker