UPDATED ACTUAL Questions and
CORRECT Answers
What is business requirement documentation? - CORRECT ANSWER -A document that
includes the business's requirements to achieve the scope, goals, objectives, and problems
identified for change.
What is a functional business requirement? - CORRECT ANSWER -Describes behaviors
for how a system should work.
What is a non-functional business requirement? - CORRECT ANSWER -Describes how a
system behaves and any limits to its functionality.
What is Nmap? - CORRECT ANSWER -Open source network vulnerability scanner.
What is Zenmap? - CORRECT ANSWER -GUI interface for Nmap.
What is Kali Linux? - CORRECT ANSWER -Linux distribution for digital forensics and
penetration testing.
What is Metasploit? - CORRECT ANSWER -Penetration testing framework used with
Kali Linux.
What is OpenVAS? - CORRECT ANSWER -Open vulnerability scanner with 50,000
vulnerabilities.
What is a SQL injection attack? - CORRECT ANSWER -Code injection technique that
exploits SQL database vulnerability.
, What is pen testing? - CORRECT ANSWER -Ethical hacking to uncover system
vulnerabilities.
Who are ethical hackers? - CORRECT ANSWER -White hat hackers who hack ethically
to improve defense.
What is ad hoc testing? - CORRECT ANSWER -Vulnerability scan for less apparent
vulnerabilities.
What is footprinting? - CORRECT ANSWER -Identifying organizational phone numbers.
What is penetration testing? - CORRECT ANSWER -Mimicking real-world attacks to
gain system access.
What is preparation in the context of security? - CORRECT ANSWER -Determining
vulnerabilities of various modems.
What is SQL injection? - CORRECT ANSWER -Code injection to reveal weak spots in
SQL database.
What is social engineering? - CORRECT ANSWER -Tricking someone into revealing
damaging information.
What is vishing? - CORRECT ANSWER -Using deceptive phone calls to hack into a
system.
What is a vulnerability scan? - CORRECT ANSWER -Testing systems to identify obvious
vulnerabilities.
What is war dialing? - CORRECT ANSWER -Automatically scanning phone numbers to
gain system access.