IT Questions Bank Match the CVSS metric group with the respective information.ITExamAnswers asked 10 months ago • Ethical HackerWhich vulnerability catalog creates a list of publicly known vulnerabilities, each assigned an ID number, description, and reference?ITExamAnswers asked 10 months ago • Ethical HackerWhich industry-standard method has created a catalog of known vulnerabilities that provides a score indicating the severity of a vulnerability?ITExamAnswers asked 10 months ago • Ethical HackerWhich option is a Linux distribution tool for forensic evidence collection?ITExamAnswers asked 10 months ago • Ethical HackerWhich encoding method can secretly exfiltrate confidential data in the payload of DNS packets?ITExamAnswers asked 10 months ago • Ethical HackerWhich tool can be used with Metasploit to maintain stealth and avoid detection from security controls implemented by an organization?ITExamAnswers asked 10 months ago • Ethical HackerWhich option is a PowerShell-based post-exploitation tool that can maintain persistence on a compromised system and run PowerShell agents without the need for powershell.exe?ITExamAnswers asked 10 months ago • Ethical HackerWhich vulnerability scanner tool offers a cloud-based service that performs continuous monitoring, vulnerability management, and compliance checking?ITExamAnswers asked 10 months ago • Ethical HackerWhich popular Linux penetration testing distribution is based on Debian GNU/Linux and has evolved from WHoppiX, WHAX, and BackTrack?ITExamAnswers asked 10 months ago • Ethical HackerWhat is a command-line tool that allows for interactive or non-interactive command execution?ITExamAnswers asked 10 months ago • Ethical HackerWhich passive reconnaissance tool can be used to find information about devices and networks on the Internet?ITExamAnswers asked 10 months ago • Ethical HackerWhich programming language element is a code template that includes initial variables and functions for creating an object?ITExamAnswers asked 10 months ago • Ethical HackerWhich tool organizes query entities within the Entity Palette and calls the search options “transforms”?ITExamAnswers asked 10 months ago • Ethical HackerWhich programming language element is a block of code that can be reused multiple times to execute a specific task?ITExamAnswers asked 10 months ago • Ethical HackerWhich tool is designed to find metadata and hidden information in documents?ITExamAnswers asked 10 months ago • Ethical Hacker