Take Test_ M3_ Quiz – CYBR525-T302 Ethical Hacking and .._
pdf
keyboard_arrow_up
School
Bellevue University *
*We aren’t endorsed by this school
Course
525
Subject
Information Systems
Date
Apr 3, 2024
Type
Pages
6
Uploaded by MajorGoldfishMaster955
3/29/24, 6:46 PM
Take Test: M3: Quiz – CYBR525-T302 Ethical Hacking and ...
https://cyberactive.bellevue.edu/webapps/assessment/take/launch.jsp?course_assessment_id=_625274_1&course_id=_525242_1&content_id=_153…
1/6
Take Test: M3: Quiz
Test Information
Description
Module 3 Quiz
This quiz is worth 20 points
Instructions
Take this twenty question multiple choice quiz over your reading assignments. You will
have two attempts to complete this quiz.
You need to take the quiz by the end of the week to earn credit.
Multiple
Attempts
This test allows 2 attempts. This is attempt number 1.
Force
Completion
This test can be saved and resumed later.
Your answers are saved automatically.
What 1-pixel x 1-pixel image file is referenced in a tag, and usually works
with a cookie to collect information about the person visiting the Website?
a.
Bugnosis detector
b.
Zone transfer
c.
Image bug
d.
Web bug
QUESTION 1
1 points Saved
Which of the following is a text file generated by a Web server and stored
on a user's browser?
a.
Index
b.
Web file
c.
Cookie
d.
Server index
QUESTION 2
1 points Saved
Question Completion Status:
Click Save and Submit to save and submit. Click Save All Answers to save all answers.
3/29/24, 6:46 PM
Take Test: M3: Quiz – CYBR525-T302 Ethical Hacking and ...
https://cyberactive.bellevue.edu/webapps/assessment/take/launch.jsp?course_assessment_id=_625274_1&course_id=_525242_1&content_id=_153…
2/6
What utility can be used to intercept detailed information from a company's
Web site?
a.
Trace
b.
JavaAttack
c.
Zed Attack Proxy
d.
WebAnalysis
QUESTION 3
1 points Saved
Which type of social engineering attack attempts to discover personal
information through the use of email?
a.
Footprinting
b.
Phishing
c.
Email surfing
d.
Spamming
QUESTION 4
1 points Saved
To see additional parameters that can be used with the Netcat command,
what should you type at the command prompt?
a.
nc -lookup
b.
nc -up
c.
nc -h
d.
nc -z
QUESTION 5
1 points Saved
Which HTTP error informs you the server understands the request but
refuses to comply?
a.
403 Forbidden
b.
401 Unauthorized
c.
409 Conflict
d.
404 Not Found
QUESTION 6
1 points Saved
QUESTION 7
1 points Saved
Click Save and Submit to save and submit. Click Save All Answers to save all answers.
3/29/24, 6:46 PM
Take Test: M3: Quiz – CYBR525-T302 Ethical Hacking and ...
https://cyberactive.bellevue.edu/webapps/assessment/take/launch.jsp?course_assessment_id=_625274_1&course_id=_525242_1&content_id=_153…
3/6
Which process enables you to see all the host computers on a network
and basically give you a diagram of an organization's network?
a.
Web bugs
b.
Footprints
c.
Namedroppers
d.
Zone transfers
Which HTTP method is used with a proxy that can dynamically switch to a
tunnel connection, such as Secure Socket Layer (SSL)?
a.
PUT
b.
GET
c.
HEAD
d.
CONNECT
QUESTION 8
1 points Saved
What tactic is being used when an attacker trailing closely behind an
employee enters a restricted area without any security credentials by
utilizing their proximity to another employee with security clearance?
a.
Shoulder surfing
b.
Footprinting
c.
Piggybacking
d.
Dumpster diving
QUESTION 9
1 points Saved
What is the passive process of finding information on a company's network
called?
a.
Footprinting
b.
Searching
c.
Calling
d.
Digging
QUESTION 10
1 points Saved
Which technique can be used to read PINs entered at ATMs or at other
QUESTION 11
1 points Saved
Click Save and Submit to save and submit. Click Save All Answers to save all answers.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
3/29/24, 6:46 PM
Take Test: M3: Quiz – CYBR525-T302 Ethical Hacking and ...
https://cyberactive.bellevue.edu/webapps/assessment/take/launch.jsp?course_assessment_id=_625274_1&course_id=_525242_1&content_id=_153…
4/6
Which technique can be used to read PINs entered at ATMs or at other
areas when a pin code is entered?
a.
Shoulder surfing
b.
Footprinting
c.
Piggybacking
d.
Zone transferring
What type of general commands allow a security tester to pull information
from a Web server using a Web browser?
a.
DNS
b.
HTTP
c.
ARP
d.
TFTP
QUESTION 12
1 points Saved
Which process utilizes the knowledge of human nature to get information
from people to use for executing an attack on a computer network?
a.
Footprinting
b.
Fingerprinting
c.
Zone transferring
d.
Social engineering
QUESTION 13
1 points Saved
Which utility can extract meta-data and documents on a Website to reveal
the document creator's network login, e-mail address, IP address, and
other important information?
a.
Samba
b.
SamSpade
c.
Bugnosis
d.
FOCA
QUESTION 14
1 points Saved
When an individual attempts to discover as much information legally
possible about their competition, what information gathering technique are
th
f
i
?
QUESTION 15
1 points Saved
Click Save and Submit to save and submit. Click Save All Answers to save all answers.
3/29/24, 6:46 PM
Take Test: M3: Quiz – CYBR525-T302 Ethical Hacking and ...
https://cyberactive.bellevue.edu/webapps/assessment/take/launch.jsp?course_assessment_id=_625274_1&course_id=_525242_1&content_id=_153…
5/6
they performing?
a.
Packet study
b.
Competitive study
c.
Basic information
d.
Competitive intelligence
Which utility is used to gather IP and domain information?
a.
Dig
b.
Whois
c.
Metis
d.
Netcat
QUESTION 16
1 points Saved
What HTTP method is the same as the GET method, but retrieves only the
header information of an HTML document, not the document body?
a.
POST
b.
PUT
c.
CONNECT
d.
HEAD
QUESTION 17
1 points Saved
What tool can be used to read and write data to ports over a network?
a.
Metis
b.
Whois
c.
Netcat
d.
Dig
QUESTION 18
1 points Saved
What social engineering tactic can be utilized to acquire old notes that may
contain written passwords or other items that document important
information?
a.
Dumpster diving
b
QUESTION 19
1 points Saved
Click Save and Submit to save and submit. Click Save All Answers to save all answers.
3/29/24, 6:46 PM
Take Test: M3: Quiz – CYBR525-T302 Ethical Hacking and ...
https://cyberactive.bellevue.edu/webapps/assessment/take/launch.jsp?course_assessment_id=_625274_1&course_id=_525242_1&content_id=_153…
6/6
b.
Piggybacking
c.
Shoulder-surfing
d.
Desk surfing
What is the HTTP method that retrieves data by URI?
a.
GET
b.
PUT
c.
HEAD
d.
CONNECT
QUESTION 20
1 points Saved
Click Save and Submit to save and submit. Click Save All Answers to save all answers.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help