Infosec questions with correct answers
What is an APT? CORRECT ANSWER Advanced Persistent Threat True or false? Data exfiltration is always the last stage in a typical kill chain. CORRECT ANSWER False - the attacker may maintain access or retreat (and attempt to destroy any evidence that the attack took place). Which of the following is used to perform "Google Hacking"? CORRECT ANSWER "Google Hacking" refers to using search phrases to identify vulnerable services and devices on the web. What is OSINT? CORRECT ANSWER Open Source Intelligence Following the CompTIA Cybersecurity Analyst syllabus, which environmental reconnaissance procdure has been omitted from the following list? Topology discovery OS fingerprinting / Service discovery Packet capture Log / router / firewall ACL review Social media profiling Social engineering DNS harvesting Phishing CORRECT ANSWER Email harvesting Drag the marker representing the most appropriate tool to use to perform the following tasks (use each tool ONCE only):
Geschreven voor
- Instelling
- Infosec
- Vak
- Infosec
Documentinformatie
- Geüpload op
- 8 december 2023
- Aantal pagina's
- 44
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
infosec questions with correct answers