Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question 1 . ……………is the method of elevating privileges and gain additional acce

ID: 3693106 • Letter: Q

Question

Question 1 . ……………is the method of elevating privileges and gain additional access once access has been gained to a system

A- Escalating privileges

B- Applying software patches

C- Passive reconnaissance

D- Denial of service attack

Question 2 all but --------- are negative aspects of manual testing

A- costly

B-deductive

C- Intrusive

D-disruptive

Question 3 Which one of the following is not considered as a passive reconnaissance

A- finding physical location of a company

B-locating access points that can be used to launch a physical attack

C- perform tests to figure out the IP address of routers and firewalls

D- Identifying an employee associated information from badges

Question 4 Which technique cannot be used by an experienced attacker to cover his/her track

A- Steganography alternate data stream (ads)

B- tunneling

C- using the admin password remotely

Question 5 The placement of more protection is the fundamental principle of …….

A- creating security policy statements

B- detectileast privilege

Question 6 Which one of the following is a formal penetration testing methodology that cannot be followed by an organization during pre-attack phase.

A- defining scope of assessment

B- restoring compromised systems

C- vulnerability mapping

D- Information gathering

Question 7 . ----------- can be used to exploit vulnerabilities during penetration testing

A- nmap

B- metasploit

C- snort

D- honeypot

Question 8 these tips are critical to having a secure infrastructure except

A- network access-least

B-prevention/detection

C- system regular check

D- test patches

Question 9 end point security automated tools include -------------- except

A- remote-access

B- personal firewall

C- anti-virus

D- host IDS/IPS

Question 10 ----------- is a good practice to prevent several vulnerabilities

A - check control panel

B- configure network access-least

C- run dedicated server

D- run multiple servers

Explanation / Answer

1) A i.e Escalating privileges

2) A costly

3) A i.e. finding location of a company

4) C i.e using the admin password remotely

5) B i.e detect least privilege

6) A defining scope of assessment

7) B i.e metasploit

8) C system regular check

9) C anti virus software

10) B configure network access least

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote