I2025IUpdate)IQsI&IAsI|IGradeIA|I100%I
CorrectI(VerifiedIAnswers)
Q:IWhichIofItheIfollowingItechniquesIisIusedIbyIanIattackerItoIperformIautomatedIsearchesI
onItheItargetIwebsiteIandIcollectIspecifiedIinformation,IsuchIasIemployeeInamesIandIemailIad
dresses?
AIWebIspidering
BIWebsiteImirroring
CIMonitoringIofIwebIupdates
DIWebsiteIlinkIextraction
Answer:
A
Q:IJude,IanIattacker,IhasItargetedIanIorganization'sIcommunicationInetwork.IWhileIconducti
ngIinitialIfootprinting,IheIusedIaIGoogleIdorkItoIfindItheIVoIPIloginIportalsIofItheIorganizatio
n.
WhatIisItheIGoogleIdorkIthatIhelpedIJudeIfindItheIVoIPIloginIportals?
AIinurl:8080Iintitle:"login"Iintext:"UserLogin"I"English"
BIinurl:/voice/advanced/Iintitle:LinksysISPAIconfiguration
CIinurl:/remote/login?lang=en
DI!Host=*.*Iintext:enc_UserPassword=*Iext:pcf
Answer:
A
,Q:IStokes,IanIattacker,IdecidedItoIfindIvulnerableIIoTIdevicesIinstalledIinItheItargetIorganiza
tion.IInIthisIprocess,IheIusedIanIonlineItoolIthatIhelpedIhimIgatherIinformationIsuchIasIaIdevic
e'sImanufacturerIdetails,IitsIIPIaddress,IandItheIlocationIwhereIitIisIinstalled.
WhatIisItheIonlineItoolIthatIStokesIusedIinItheIaboveIscenario?
AIDuckDuckGo
BIBaidu
CIShodan
DIBing
Answer:
C
Q:ICenSysISolutionsIhiredIClark,IaIsecurityIprofessional,ItoIenhanceItheIInternetIsecurityIofI
theIorganization.IToIachieveItheIgoal,IClarkIemployedIaItoolIthatIprovidesIvariousIInternetIsec
urityIservices,IincludingIanti-fraudIandIanti-
phishingIservices,IapplicationItesting,IandIPCIIscanning.
WhatIisItheItoolIusedIbyIClarkItoIperformItheIaboveIactivities?
AIBlisqy
BIOmniPeek
CINetcraft
DIBTCrawler
Answer:
C
Q:IClarkIisIaIprofessionalIhacker.IHeItargetedIanIorganizationIforIfinancialIbenefitIandIusedI
variousIfootprintingItechniquesItoIgatherIinformationIaboutItheItargetInetwork.IInIthisIprocess,
IheIemployedIaIprotocolIusedIforIqueryingIdatabasesIthatIstoreItheIregisteredIusersIorIassignee
sIofIanIInternetIresource,IsuchIasIaIdomainIname,IanIIPIaddressIblock,IorIanIautonomousIsyst
em.
WhatIisItheIprotocolIemployedIbyIClarkIinItheIaboveIscenario?
,AISMB
BIWhois
CISNMP
DIFTP
Answer:
B
Q:IWhichIofItheIfollowingItoolsIinIOSRFrameworkIisIusedIbyIattackersItoIcheckIforIaIuserI
profileIonIupItoI290IdifferentIplatforms?
AIusufy.py
BIphonefy.py
CIentify.py
DIsearchfy.py
Answer:
A
Q:IWhatIisItheIfeatureIinIFOCAIthatIchecksIeachIdomainItoIascertainItheIhostInamesIconfig
uredIinINS,IMX,IandISPFIserversItoIdiscoverItheInewIhostIandIdomainInames?
AICommonInames
BIDNSIsearch
CIWebIsearch
DIBingIIP
Answer:
B
Q:IWhichIofItheIfollowingIcountermeasuresIshouldIbeIfollowedItoIsafeguardItheIprivacy,Idat
a,IandIreputationIofIanIorganizationIandItoIpreventIinformationIdisclosure?
, AIKeepingItheIdomainInameIprofileIpublic
BIEnablingIdirectoryIlistingsIinItheIwebIservers
CIAvoidingIdomain-levelIcross-linkingIforIcriticalIassets
DITurningIonIgeolocationIaccessIonIallImobileIdevices
Answer:
C
Q:IWhichIofItheIfollowingITCPIcommunicationIflagsInotifiesItheItransmissionIofIaInewIseq
uenceInumberIandIrepresentsItheIestablishmentIofIaIconnectionIbetweenItwoIhosts?
AIFINIflag
BISYNIflag
CIPSHIflag
DIRSTIflag
Answer:
B
Q:IWhichIofItheIfollowingIhpingIcommandsIisIusedIbyIanIattackerItoIscanItheIentireIsubnetI
toIdetectIliveIhostsIinIaItargetInetwork?
AIhping3I-8I50-60I-SI10.0.0.25I-V
BIhping3I-FI-PI-UI10.0.0.25I-pI80
CIhping3I-1I10.0.1.xI--rand-destI-IIeth0
DIhping3I-9IHTTPI-IIeth0
Answer:
C