IT Questions Bank Which three tools can be used to perform passive reconnaissance? (Choose three.)ITExamAnswers asked 10 months ago • Ethical HackerWhich statement describes the concept of Bash shell in operating systems?ITExamAnswers asked 10 months ago • Ethical HackerRefer to the exhibit. Which Python data structure is used?ITExamAnswers asked 10 months ago • Ethical HackerWhat are three examples of the items a penetration tester must clean from systems as part of the post-engagement cleanup process? (Choose three.)ITExamAnswers asked 10 months ago • Ethical HackerA security audit for a company recommends that the company implement multifactor authentication for the datacenter access. Which solution would achieve the goal?ITExamAnswers asked 10 months ago • Ethical HackerThe IT security department of a company has developed an access policy for the datacenter. The policy specifies that the datacenter is locked between 5:30 pm through 7:45 am daily except for emergency access approved by the IT manager. What is the operational control implemented?ITExamAnswers asked 10 months ago • Ethical HackerA company hires a professional to perform penetration testing. The tester has identified and verified that one web application is vulnerable to SQL injection and cross-site scripting attacks. Which technical control measure should the tester recommend to the company?ITExamAnswers asked 10 months ago • Ethical HackerWhy is it important to use Common Vulnerability Scoring System (CVSS) to reference the ratings of vulnerabilities identified when preparing the final penetration testing report?ITExamAnswers asked 10 months ago • Ethical HackerWhich two options are PowerSploit modules/scripts? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerWhich two tools can create a remote connection with a compromised system? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerMatch the PowerSploit module/script to the respective description.ITExamAnswers asked 10 months ago • Ethical HackerRefer to the exhibit. The attacking system has a listener (port open), and the victim initiates a connection back to the attacking system. Which two resources can create this type of malicious activity? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerWhich C2 utility can be used to create multiple reverse shells?ITExamAnswers asked 10 months ago • Ethical HackerMatch the insecure code practice to the description.ITExamAnswers asked 10 months ago • Ethical HackerWhich two Bluetooth Low Energy (BLE) statements are true? (Choose two.)ITExamAnswers asked 10 months ago • Ethical Hacker