IT Questions Bank Which Apple iOS and Android tool can be used to spoof a phone number?ITExamAnswers asked 10 months ago • Ethical HackerWhich tool provides a threat actor a web console to manipulate users who are victims of cross-site scripting (XSS) attacks?ITExamAnswers asked 10 months ago • Ethical HackerWhich social engineering physical attack statement is correct?ITExamAnswers asked 10 months ago • Ethical HackerA threat actor has sent a phishing email to a victim stating that suspicious activity has been detected on their bank account and that they must immediately click on a provided link to change their password. What method of influence is being used by the threat actor?ITExamAnswers asked 10 months ago • Ethical HackerApple is a company constantly working towards making its products and processes more environmentally friendly. Therefore, the Apple brand is associated with ideals and values that customers can relate to and support. What method of influence is being used by Apple?ITExamAnswers asked 10 months ago • Ethical HackerWhat method of influence is characterized when a celebrity endorses a product on social media?ITExamAnswers asked 10 months ago • Ethical HackerA salesperson is attempting to convince a customer to buy a product because limited supplies are available. Which social engineering method of influence is being used by the salesperson?ITExamAnswers asked 10 months ago • Ethical HackerWhich option is a voice over IP management tool that can be used to impersonate caller ID?ITExamAnswers asked 10 months ago • Ethical HackerWhy would a threat actor use the Social-Engineering Toolkit (SET)?ITExamAnswers asked 10 months ago • Ethical HackerA threat actor has altered the host file for a commonly accessed website on the computer of a victim. Now when the user clicks on the website link, they are redirected to a malicious website. What type of attack has the threat actor accomplished?ITExamAnswers asked 10 months ago • Ethical HackerWhat is the act of gaining knowledge or information from a victim without directly asking for that particular information?ITExamAnswers asked 10 months ago • Ethical HackerWhat is a watering hole attack?ITExamAnswers asked 10 months ago • Ethical HackerWhat type of threat allows an attacker to obtain the credentials of a bank client by spoofing the login webpage of a financial institution?ITExamAnswers asked 10 months ago • Ethical HackerAn attacker is launching a reflected DDoS attack in which the response traffic is made up of packets that are much larger than those that the attacker initially sent. Which type of attack is this?ITExamAnswers asked 10 months ago • Ethical HackerWhat is a common mitigation practice for ARP cache poisoning attacks on switches to prevent spoofing of Layer 2 addresses?ITExamAnswers asked 10 months ago • Ethical Hacker