and Answers 100% Pass
What is the difference between credentialed and non credentialed scanning? * -
✔✔Credentialed vulnerability scan you have the credentials to access the systems in
your environment.
Non-credentialed scans can only observe responses from the outside.
Why do we use a WAF? - ✔✔Protects the web server from malicious web traffic
What are the Bluetooth attacks? *
-Bluejacking
-Blue-snarfing
-Bluebugging
-Blueknifing - ✔✔Bluejacking
Blue-snarfing
Brittie Donald, All Rights Reserved © 2025 1
, Bluebugging
Which Bluetooth attack is sending of unsolicited messages over Bluetooth? *
-Bluejacking
-Blue-snarfing
-Bluebugging
-Blueknifing - ✔✔Bluejacking
An attacker makes processes execute out of sequence to control the result in a way that
accomplishes the attackers goals. *
A. Pre-emptive attack
B. Logic Bomb
C. Race Condition
D. SaaS - ✔✔Race Condition
What causes resource exhaustion? *
3 points
A. DDoS
B. Ping Flood
C. Smurf Attack
Brittie Donald, All Rights Reserved © 2025 2