IT Questions Bank Which specification defines the format used by image and sound files to capture metadata?ITExamAnswers asked 10 months ago • Ethical HackerWhen performing passive reconnaissance, which Linux command can be used to identify the technical and administrative contacts of a given domain?ITExamAnswers asked 10 months ago • Ethical HackerWhich two tools could be used to gather DNS information passively? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerA user has found a USB pen drive in the corporate parking lot. What should the user do with this pen drive?ITExamAnswers asked 10 months ago • Ethical HackerA new employee is celebrating their position with a large company by posting a picture of their access identification on social media. What kind of physical attack has the new employee unknowingly enabled?ITExamAnswers asked 10 months ago • Ethical HackerWhich tool can send fake notifications to the browser of a victim?ITExamAnswers asked 10 months ago • Ethical HackerWhich tool permits post-exploitation activities, such as Windows reverse VNC DLL and reverse TCP shell?ITExamAnswers asked 10 months ago • Ethical HackerA threat actor has sent a text message to a victim stating that they have won bitcoins in a bank contest. To claim their prize, the victim must click the provided link and enter their bank account information. What social engineering attack can be accomplished if the user enters their banking information?ITExamAnswers asked 10 months ago • Ethical HackerWhich Apple iOS and Android tools can spoof a phone number, record calls, and generate different background noises?ITExamAnswers asked 10 months ago • Ethical HackerWhat is the purpose of a vishing attack?ITExamAnswers asked 10 months ago • Ethical HackerWho is the target of a whaling attack?ITExamAnswers asked 10 months ago • Ethical HackerWhich tool can launch social engineering attacks and be integrated with third-party tools and frameworks such as Metasploit?ITExamAnswers asked 10 months ago • Ethical HackerWhich resource would mitigate piggybacking and tailgating?ITExamAnswers asked 10 months ago • Ethical HackerWhich two access control options are commonly used in conjunction with access control vestibules? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerWhat two physical attacks are mitigated by using access control vestibules? (Choose two.)ITExamAnswers asked 10 months ago • Ethical Hacker