100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
WGU Master's Course C701 - Ethical Hacking Latest Exam 2024 Complete 130 Actual Exam Questions with 100% Correct Verified Answers/ Graded A+ €17,50
In winkelwagen

Tentamen (uitwerkingen)

WGU Master's Course C701 - Ethical Hacking Latest Exam 2024 Complete 130 Actual Exam Questions with 100% Correct Verified Answers/ Graded A+

 6 keer bekeken  0 keer verkocht
  • Vak
  • WGU Master\\\'s Course C701
  • Instelling
  • WGU Master\\\'s Course C701

WGU Master's Course C701 - Ethical Hacking Latest Exam 2024 Complete 130 Actual Exam Questions with 100% Correct Verified Answers/ Graded A+

Voorbeeld 4 van de 41  pagina's

  • 30 december 2024
  • 41
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • WGU Master's Course C701
  • WGU Master's Course C701
avatar-seller
WGU Master's Course C701 - Ethical Hacking
Latest Exam 2024 Complete 130 Actual
Exam Questions with 100% Correct Verified
Answers/ Graded A+

What is the feature in FOCA that checks each domain to ascertain the host names
configured in NS, MX, and SPF servers to discover the new host and domain
names?
A Common names
B DNS search
C Web search
D Bing IP - Correct Answer - B


Which of the following countermeasures should be followed to safeguard the
privacy, data, and reputation of an organization and to prevent information
disclosure?
A Keeping the domain name profile public
B Enabling directory listings in the web servers
C Avoiding domain-level cross-linking for critical assets
D Turning on geolocation access on all mobile devices - Correct Answer - C


Which of the following TCP communication flags notifies the transmission of a
new sequence number and represents the establishment of a connection between
two hosts?
A FIN flag
B SYN flag
C PSH flag


pg. 1

,D RST flag - Correct Answer - B


Ben, an ethical hacker, was hired by an organization to check its security levels.
In the process, Ben examined the network from a hacker's perspective to identify
exploits and vulnerabilities accessible to the outside world by using devices such
as firewalls, routers, and servers.
Which of the following types of vulnerability assessment did Ben perform on the
organization?
A Active assessment
B Passive assessment
C External assessment
D Internal assessment - Correct Answer - C


Clark, an ethical hacker, is performing vulnerability assessment on an
organization's network. Instead of performing footprinting and network scanning,
he used tools such as Nessus and Qualys for the assessment.
Which of the following types of vulnerability assessment did Clark perform on the
organization?
A Manual assessment
B Credentialed assessment
C Distributed assessment
D Automated assessment - Correct Answer - D


Ray, a security professional in an organization, was instructed to identify all
potential security weaknesses in the organization and fix them before an attacker
can exploit them. In the process, he consulted a third-party consulting firm to run
a security audit of the organization's network
Which of the following types of solutions did Ray implement in the above
scenario?
A Product-based solution
B Service-based solution
C Tree-based assessment



pg. 2

,D Inference-based assessment - Correct Answer - B


Karen, a security professional in an organization, performed a vulnerability
assessment on the organization's network to check for vulnerabilities. In this
process, she used a type of location data examination scanner that resides on a
single machine but can scan several machines on the same network.
Which of the following types of location and data examination tools did Karen
use?
A Network-based scanner
B Agent-based scanner
C Proxy scanner
D Cluster scanner - Correct Answer - B


Rick, an ethical hacker, is performing a vulnerability assessment on an
organization and a security audit on the organization's network. In this process,
he used a tool for identifying vulnerabilities, configuration issues, and malware
that attackers use to penetrate networks.
Which of the following tools did Rick use to perform vulnerability assessment?
A Metagoofil
B Infoga
C Immunity Debugger
D Nessus - Correct Answer - D


Which of the following types of password attacks does not require any technical
knowledge about hacking or system exploitation and includes techniques such
as shoulder surfing, social engineering, and dumpster diving?
A Active online attacks
B Passive online attacks
C Non-electronic attacks
D Offline attacks - Correct Answer - C




pg. 3

, Which of the following hping commands is used by an attacker to scan the entire
subnet to detect live hosts in a target network?
A hping3 -8 50-60 -S 10.0.0.25 -V
B hping3 -F -P -U 10.0.0.25 -p 80
C hping3 -1 10.0.1.x --rand-dest -I eth0
D hping3 -9 HTTP -I eth0 - Correct Answer - C


Which of the following commands is used by an attacker to perform an ICMP
ECHO ping sweep that can determine the live hosts from a range of IP addresses
by sending ICMP ECHO requests to multiple hosts?
A nmap -sn -PR 10.10.10.10
B nmap -sn -PU 10.10.10.10
C nmap -sn -PE 10.10.10.10
D nmap -sn -PE 10.10.10.5-15 - Correct Answer - D


Which of the following scanning techniques is used by an attacker to send a TCP
frame to a remote device with the FIN, URG, and PUSH flags set?
A Xmas scan
B TCP Maimon scan
C ACK flag probe scan
D IDLE/IPID header scan - Correct Answer - A


A certain scanning technique has no three-way handshake, and the system does
not respond when the port is open; when the port is closed, the system responds
with an ICMP port unreachable message.
Which of the following is this scanning technique?
A List scanning
B SCTP COOKIE ECHO scanning
C IPv6 scanning
D UDP scanning - Correct Answer - D



pg. 4

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper ASSIGNMENT7. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €17,50. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 56880 samenvattingen verkocht

Opgericht in 2010, al 15 jaar dé plek om samenvattingen te kopen

Start met verkopen
€17,50
  • (0)
In winkelwagen
Toegevoegd