Take Test_ M3_ Quiz – CYBR525-T302 Ethical Hacking and .._

pdf

School

Bellevue University *

*We aren’t endorsed by this school

Course

525

Subject

Information Systems

Date

Apr 3, 2024

Type

pdf

Pages

6

Uploaded by MajorGoldfishMaster955

Report
3/29/24, 6:46 PM Take Test: M3: Quiz – CYBR525-T302 Ethical Hacking and ... https://cyberactive.bellevue.edu/webapps/assessment/take/launch.jsp?course_assessment_id=_625274_1&course_id=_525242_1&content_id=_153… 1/6 Take Test: M3: Quiz Test Information Description Module 3 Quiz This quiz is worth 20 points Instructions Take this twenty question multiple choice quiz over your reading assignments. You will have two attempts to complete this quiz. You need to take the quiz by the end of the week to earn credit. Multiple Attempts This test allows 2 attempts. This is attempt number 1. Force Completion This test can be saved and resumed later. Your answers are saved automatically. What 1-pixel x 1-pixel image file is referenced in a tag, and usually works with a cookie to collect information about the person visiting the Website? a. Bugnosis detector b. Zone transfer c. Image bug d. Web bug QUESTION 1 1 points Saved Which of the following is a text file generated by a Web server and stored on a user's browser? a. Index b. Web file c. Cookie d. Server index QUESTION 2 1 points Saved Question Completion Status: Click Save and Submit to save and submit. Click Save All Answers to save all answers.
3/29/24, 6:46 PM Take Test: M3: Quiz – CYBR525-T302 Ethical Hacking and ... https://cyberactive.bellevue.edu/webapps/assessment/take/launch.jsp?course_assessment_id=_625274_1&course_id=_525242_1&content_id=_153… 2/6 What utility can be used to intercept detailed information from a company's Web site? a. Trace b. JavaAttack c. Zed Attack Proxy d. WebAnalysis QUESTION 3 1 points Saved Which type of social engineering attack attempts to discover personal information through the use of email? a. Footprinting b. Phishing c. Email surfing d. Spamming QUESTION 4 1 points Saved To see additional parameters that can be used with the Netcat command, what should you type at the command prompt? a. nc -lookup b. nc -up c. nc -h d. nc -z QUESTION 5 1 points Saved Which HTTP error informs you the server understands the request but refuses to comply? a. 403 Forbidden b. 401 Unauthorized c. 409 Conflict d. 404 Not Found QUESTION 6 1 points Saved QUESTION 7 1 points Saved Click Save and Submit to save and submit. Click Save All Answers to save all answers.
3/29/24, 6:46 PM Take Test: M3: Quiz – CYBR525-T302 Ethical Hacking and ... https://cyberactive.bellevue.edu/webapps/assessment/take/launch.jsp?course_assessment_id=_625274_1&course_id=_525242_1&content_id=_153… 3/6 Which process enables you to see all the host computers on a network and basically give you a diagram of an organization's network? a. Web bugs b. Footprints c. Namedroppers d. Zone transfers Which HTTP method is used with a proxy that can dynamically switch to a tunnel connection, such as Secure Socket Layer (SSL)? a. PUT b. GET c. HEAD d. CONNECT QUESTION 8 1 points Saved What tactic is being used when an attacker trailing closely behind an employee enters a restricted area without any security credentials by utilizing their proximity to another employee with security clearance? a. Shoulder surfing b. Footprinting c. Piggybacking d. Dumpster diving QUESTION 9 1 points Saved What is the passive process of finding information on a company's network called? a. Footprinting b. Searching c. Calling d. Digging QUESTION 10 1 points Saved Which technique can be used to read PINs entered at ATMs or at other QUESTION 11 1 points Saved Click Save and Submit to save and submit. Click Save All Answers to save all answers.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
3/29/24, 6:46 PM Take Test: M3: Quiz – CYBR525-T302 Ethical Hacking and ... https://cyberactive.bellevue.edu/webapps/assessment/take/launch.jsp?course_assessment_id=_625274_1&course_id=_525242_1&content_id=_153… 4/6 Which technique can be used to read PINs entered at ATMs or at other areas when a pin code is entered? a. Shoulder surfing b. Footprinting c. Piggybacking d. Zone transferring What type of general commands allow a security tester to pull information from a Web server using a Web browser? a. DNS b. HTTP c. ARP d. TFTP QUESTION 12 1 points Saved Which process utilizes the knowledge of human nature to get information from people to use for executing an attack on a computer network? a. Footprinting b. Fingerprinting c. Zone transferring d. Social engineering QUESTION 13 1 points Saved Which utility can extract meta-data and documents on a Website to reveal the document creator's network login, e-mail address, IP address, and other important information? a. Samba b. SamSpade c. Bugnosis d. FOCA QUESTION 14 1 points Saved When an individual attempts to discover as much information legally possible about their competition, what information gathering technique are th f i ? QUESTION 15 1 points Saved Click Save and Submit to save and submit. Click Save All Answers to save all answers.
3/29/24, 6:46 PM Take Test: M3: Quiz – CYBR525-T302 Ethical Hacking and ... https://cyberactive.bellevue.edu/webapps/assessment/take/launch.jsp?course_assessment_id=_625274_1&course_id=_525242_1&content_id=_153… 5/6 they performing? a. Packet study b. Competitive study c. Basic information d. Competitive intelligence Which utility is used to gather IP and domain information? a. Dig b. Whois c. Metis d. Netcat QUESTION 16 1 points Saved What HTTP method is the same as the GET method, but retrieves only the header information of an HTML document, not the document body? a. POST b. PUT c. CONNECT d. HEAD QUESTION 17 1 points Saved What tool can be used to read and write data to ports over a network? a. Metis b. Whois c. Netcat d. Dig QUESTION 18 1 points Saved What social engineering tactic can be utilized to acquire old notes that may contain written passwords or other items that document important information? a. Dumpster diving b QUESTION 19 1 points Saved Click Save and Submit to save and submit. Click Save All Answers to save all answers.
3/29/24, 6:46 PM Take Test: M3: Quiz – CYBR525-T302 Ethical Hacking and ... https://cyberactive.bellevue.edu/webapps/assessment/take/launch.jsp?course_assessment_id=_625274_1&course_id=_525242_1&content_id=_153… 6/6 b. Piggybacking c. Shoulder-surfing d. Desk surfing What is the HTTP method that retrieves data by URI? a. GET b. PUT c. HEAD d. CONNECT QUESTION 20 1 points Saved Click Save and Submit to save and submit. Click Save All Answers to save all answers.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help