Take Test_ M3_ Quiz – CYBR525-T302 Ethical Hacking and

.pdf

School

Bellevue University *

*We aren’t endorsed by this school

Course

525

Subject

Information Systems

Date

Apr 3, 2024

Type

pdf

Pages

6

Uploaded by MajorGoldfishMaster955

Report
3/29/24, 6:46 PM Take Test: M3: Quiz – CYBR525-T302 Ethical Hacking and ... https://cyberactive.bellevue.edu/webapps/assessment/take/launch.jsp?course_assessment_id=_625274_1&course_id=_525242_1&content_id=_153… 1/6 Take Test: M3: Quiz Test Information Description Module 3 Quiz This quiz is worth 20 points Instructions Take this twenty question multiple choice quiz over your reading assignments. You will have two attempts to complete this quiz. You need to take the quiz by the end of the week to earn credit. Multiple Attempts This test allows 2 attempts. This is attempt number 1. Force Completion This test can be saved and resumed later. Your answers are saved automatically. What 1-pixel x 1-pixel image file is referenced in a tag, and usually works with a cookie to collect information about the person visiting the Website? a. Bugnosis detector b. Zone transfer c. Image bug d. Web bug QUESTION 1 1 points Saved Which of the following is a text file generated by a Web server and stored on a user's browser? a. Index b. Web file c. Cookie d. Server index QUESTION 2 1 points Saved Question Completion Status: Click Save and Submit to save and submit. Click Save All Answers to save all answers.
3/29/24, 6:46 PM Take Test: M3: Quiz – CYBR525-T302 Ethical Hacking and ... https://cyberactive.bellevue.edu/webapps/assessment/take/launch.jsp?course_assessment_id=_625274_1&course_id=_525242_1&content_id=_153… 2/6 What utility can be used to intercept detailed information from a company's Web site? a. Trace b. JavaAttack c. Zed Attack Proxy d. WebAnalysis QUESTION 3 1 points Saved Which type of social engineering attack attempts to discover personal information through the use of email? a. Footprinting b. Phishing c. Email surfing d. Spamming QUESTION 4 1 points Saved To see additional parameters that can be used with the Netcat command, what should you type at the command prompt? a. nc -lookup b. nc -up c. nc -h d. nc -z QUESTION 5 1 points Saved Which HTTP error informs you the server understands the request but refuses to comply? a. 403 Forbidden b. 401 Unauthorized c. 409 Conflict d. 404 Not Found QUESTION 6 1 points Saved QUESTION 7 1 points Saved Click Save and Submit to save and submit. Click Save All Answers to save all answers.
3/29/24, 6:46 PM Take Test: M3: Quiz – CYBR525-T302 Ethical Hacking and ... https://cyberactive.bellevue.edu/webapps/assessment/take/launch.jsp?course_assessment_id=_625274_1&course_id=_525242_1&content_id=_153… 3/6 Which process enables you to see all the host computers on a network and basically give you a diagram of an organization's network? a. Web bugs b. Footprints c. Namedroppers d. Zone transfers Which HTTP method is used with a proxy that can dynamically switch to a tunnel connection, such as Secure Socket Layer (SSL)? a. PUT b. GET c. HEAD d. CONNECT QUESTION 8 1 points Saved What tactic is being used when an attacker trailing closely behind an employee enters a restricted area without any security credentials by utilizing their proximity to another employee with security clearance? a. Shoulder surfing b. Footprinting c. Piggybacking d. Dumpster diving QUESTION 9 1 points Saved What is the passive process of finding information on a company's network called? a. Footprinting b. Searching c. Calling d. Digging QUESTION 10 1 points Saved Which technique can be used to read PINs entered at ATMs or at other QUESTION 11 1 points Saved Click Save and Submit to save and submit. Click Save All Answers to save all answers.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help