IT Questions Bank Which Linux distribution comes with more than 1900 security penetration testing tools?ITExamAnswers asked 10 months ago • Ethical HackerWhat are two tools that can be used to perform credential attacks? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerWhat are two tools that can be used to perform active reconnaissance? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerWhich domain name database query utility has been restricted by the European Union´s General Data Protection Regulation (GDPR) to protect privacy?ITExamAnswers asked 10 months ago • Ethical HackerWhat is the definition of a library in application software?ITExamAnswers asked 10 months ago • Ethical HackerWhich programming language elements perform similar tasks?ITExamAnswers asked 10 months ago • Ethical HackerWhat kind of data structure in Python is represented in the example below? cves = [‘CVE-2022-0945’, ‘CVE-2023-1234’, ‘CVE-2022-0987’]ITExamAnswers asked 10 months ago • Ethical HackerWhich term describes a programming language component such as JavaScript Object Notation (JSON)?ITExamAnswers asked 10 months ago • Ethical HackerWhich programming language data structure is a special variable with more than one value at a time?ITExamAnswers asked 10 months ago • Ethical HackerWhat is the definition of a procedure used in an application software?ITExamAnswers asked 10 months ago • Ethical HackerWhich two items can be included in a library? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerWhich two items are data structures used in programming languages? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerWhich two items are programming logic constructs? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerWhat are two exploitation frameworks? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerAn attacker uses John the Ripper to crack a password file. The attacker issued the ~$ john –list=formats command in Kali Linux. Which information is the attacker trying to find?ITExamAnswers asked 10 months ago • Ethical Hacker