Answers 100% Pass
What is the difference between credentialed and non credentialed scanning? * -
✔✔Credentialed vulnerability scan you have the credentials to access the systems in
your environment.
Non-credentialed scans can only observe responses from the outside.
Why do we use a WAF? - ✔✔Protects the web server from malicious web traffic
What are the Bluetooth attacks? Pick all that apply
A. Bluejacking
B. Blue-snarfing
C. Bluebugging
D. Blueknifing - ✔✔A B C
Which Bluetooth attack is sending of unsolicited messages over Bluetooth? *
Brittie Donald, All Rights Reserved © 2025 1
, A. Bluejacking
B. Blue-snarfing
C. Bluebugging
D. Blueknifing - ✔✔A
An attacker makes processes execute out of sequence to control the result in a way that
accomplishes the attackers goals. *
A. Pre-emptive attack
B. Logic Bomb
C. Race Condition
D. SaaS - ✔✔C
What causes resource exhaustion? *
3 points
A. DDoS
B. Ping Flood
C. Smurf Attack
D. Fraggle Attack
E. All of the Above - ✔✔E
Brittie Donald, All Rights Reserved © 2025 2