Take Test_ M3_ Quiz – CYBR525-T302 Ethical Hacking and
.pdf
keyboard_arrow_up
School
Bellevue University *
*We aren’t endorsed by this school
Course
525
Subject
Information Systems
Date
Apr 3, 2024
Type
Pages
6
Uploaded by MajorGoldfishMaster955
3/29/24, 6:46 PM
Take Test: M3: Quiz – CYBR525-T302 Ethical Hacking and ...
https://cyberactive.bellevue.edu/webapps/assessment/take/launch.jsp?course_assessment_id=_625274_1&course_id=_525242_1&content_id=_153…
1/6
Take Test: M3: Quiz
Test Information
Description
Module 3 Quiz
This quiz is worth 20 points
Instructions
Take this twenty question multiple choice quiz over your reading assignments. You will
have two attempts to complete this quiz.
You need to take the quiz by the end of the week to earn credit.
Multiple
Attempts
This test allows 2 attempts. This is attempt number 1.
Force
Completion
This test can be saved and resumed later.
Your answers are saved automatically.
What 1-pixel x 1-pixel image file is referenced in a tag, and usually works
with a cookie to collect information about the person visiting the Website?
a.
Bugnosis detector
b.
Zone transfer
c.
Image bug
d.
Web bug
QUESTION 1
1 points Saved
Which of the following is a text file generated by a Web server and stored
on a user's browser?
a.
Index
b.
Web file
c.
Cookie
d.
Server index
QUESTION 2
1 points Saved
Question Completion Status:
Click Save and Submit to save and submit. Click Save All Answers to save all answers.
3/29/24, 6:46 PM
Take Test: M3: Quiz – CYBR525-T302 Ethical Hacking and ...
https://cyberactive.bellevue.edu/webapps/assessment/take/launch.jsp?course_assessment_id=_625274_1&course_id=_525242_1&content_id=_153…
2/6
What utility can be used to intercept detailed information from a company's
Web site?
a.
Trace
b.
JavaAttack
c.
Zed Attack Proxy
d.
WebAnalysis
QUESTION 3
1 points Saved
Which type of social engineering attack attempts to discover personal
information through the use of email?
a.
Footprinting
b.
Phishing
c.
Email surfing
d.
Spamming
QUESTION 4
1 points Saved
To see additional parameters that can be used with the Netcat command,
what should you type at the command prompt?
a.
nc -lookup
b.
nc -up
c.
nc -h
d.
nc -z
QUESTION 5
1 points Saved
Which HTTP error informs you the server understands the request but
refuses to comply?
a.
403 Forbidden
b.
401 Unauthorized
c.
409 Conflict
d.
404 Not Found
QUESTION 6
1 points Saved
QUESTION 7
1 points Saved
Click Save and Submit to save and submit. Click Save All Answers to save all answers.
3/29/24, 6:46 PM
Take Test: M3: Quiz – CYBR525-T302 Ethical Hacking and ...
https://cyberactive.bellevue.edu/webapps/assessment/take/launch.jsp?course_assessment_id=_625274_1&course_id=_525242_1&content_id=_153…
3/6
Which process enables you to see all the host computers on a network
and basically give you a diagram of an organization's network?
a.
Web bugs
b.
Footprints
c.
Namedroppers
d.
Zone transfers
Which HTTP method is used with a proxy that can dynamically switch to a
tunnel connection, such as Secure Socket Layer (SSL)?
a.
PUT
b.
GET
c.
HEAD
d.
CONNECT
QUESTION 8
1 points Saved
What tactic is being used when an attacker trailing closely behind an
employee enters a restricted area without any security credentials by
utilizing their proximity to another employee with security clearance?
a.
Shoulder surfing
b.
Footprinting
c.
Piggybacking
d.
Dumpster diving
QUESTION 9
1 points Saved
What is the passive process of finding information on a company's network
called?
a.
Footprinting
b.
Searching
c.
Calling
d.
Digging
QUESTION 10
1 points Saved
Which technique can be used to read PINs entered at ATMs or at other
QUESTION 11
1 points Saved
Click Save and Submit to save and submit. Click Save All Answers to save all answers.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help