Lesson 1 – 20 (Latest Update 2025 /
2026) Penetration Testing | Study
Guide Questions and Answers |
Grade A | 100% Correct (Verified
Solutions) - WGU
Question:
Kismet
Answer:
Included with Kali Linux, can capture packets and also act as a wireless IDS.
Question:
Wifite2
Answer:
a wireless auditing tool you can use to assess the WLAN
,Question:
Authoritative Transfer (AXFR)
Answer:
Sometimes called a DNS Zone Transfer
Question:
on path attack
Answer:
Attack where the threat actor makes an independent connection between two
victims and is able to read and possibly modify traffic.
Question:
living off the land (LoTL)
Answer:
Exploit techniques that use standard system tools and packages to perform
intrusions.
,Question:
Fileless Malware
Answer:
Malware that does not need to be installed by the user because it uses
legitimate programs that are already installed to infect a computer
Question:
sed (stream editor)
Answer:
Has the ability to search, find, delete, replace, insert, or edit without having to
open the file.
Question:
Incognito
Answer:
type of attack which allows you to impersonate user tokens after you have
compromised a system
, Question:
(MACE)
Answer:
a file's modification, access, created, and entry modified
Question:
cipher.exe
Answer:
Windows has a built in command, called cipher.exe, that can securely delete a
file.
Question:
lifecycle of a vulnerability
Answer:
A process that moves from the initial discovery of a vulnerability, through
coordination, mitigation, management, and documentation.