Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien 4,6 TrustPilot
logo-home
Examen

Infosec Exam Questions Answered Correctly Latest Update

Note
-
Vendu
-
Pages
30
Qualité
A+
Publié le
29-09-2025
Écrit en
2025/2026

Infosec Exam Questions Answered Correctly Latest Update What is an APT? - Answers Advanced Persistent Threat True or false? Data exfiltration is always the last stage in a typical kill chain. - Answers False - the attacker may maintain access or retreat (and attempt to destroy any evidence that the attack took place). Which of the following is used to perform "Google Hacking"? - Answers "Google Hacking" refers to using search phrases to identify vulnerable services and devices on the web. What is OSINT? - Answers Open Source Intelligence Following the CompTIA Cybersecurity Analyst syllabus, which environmental reconnaissance procdure has been omitted from the following list? Topology discovery OS fingerprinting / Service discovery Packet capture Log / router / firewall ACL review Social media profiling Social engineering DNS harvesting Phishing - Answers Email harvesting Drag the marker representing the most appropriate tool to use to perform the following tasks (use each tool ONCE only): blankCorrect - perform a zone transfer. blankCorrect - identify address autoconfiguration. blankCorrect - test the local subnet for host responses. blankCorrect - identify the path taken to communicate with a host. blankCorrect - show the process using a listening port on the local host blankCorrect - identify the OS of a remote host. - Answers [nslookup] - perform a zone transfer. [ipconfig] - identify address autoconfiguration. [ping] - test the local subnet for host responses. [tracert] - identify the path taken to communicate with a host. [netstat] - show the process using a listening port on the local host [nmap] - identify the OS of a remote host. Write the command to use Nmap to scan IP addresses but suppress a port scan on the local subnet if the local host is configured with IP address 172.16.17.48 and subnet mask 255.255.240.0 (for the purpose of this question, you must write the IP of the network address rather than any of the valid host addresses): - Answers nmap -sn 172.16.16.0/20 Write the switch to add to an Nmap scan to record the path to the target: - Answers --traceroute (or --tr) True or false? You could use the command 'netstat -sp TCP' to check the number of reset connections since the local Windows host last booted. - Answers true Drag the label containing the switch over the appropriate marker to perform each of the following Nmap scan types (use each label ONCE only or not at all): blankCorrect - half-open scan. blankCorrect - full connect scan. blankCorrect - connectionless scan. blankIncorrect - "Christmas Tree" scan. - Answers [‑sS] - half-open scan. [‑sT] - full connect scan. [‑sU] - connectionless scan. [‑sX] - "Christmas Tree" scan. A troubleshooting utility outputs a series of lines such as: "1 <10ms 1ms 10.1.0.1" - which utility is being used? - Answers tracert Why should a firewall be configured to block packets from an external network with source IP addresses belonging to the internal network? - Answers : The packets must have spoofed IP addresses What port on a firewall must be opened to allow an SSH connection to a web server? - Answers 22 What feature of a token-based authentication system makes it resistant to replay attacks? - Answers The token is time stamped Which of the following are fields in an Ethernet frame? - Answers CRC, Type Which of the following password policies provides the BEST defense against a brute force password guessing attack? - Answers Passwords must be at least 8 characters Which protocol is used for Windows File and Printer Sharing? - Answers SMB What is "NX"? - Answers Address space protection technology Which of the following devices would be used for NAT? - Answers Router True or false? Data exfiltration is always the last stage in a typical kill chain. - Answers False - the attacker may maintain access or retreat (and attempt to destroy any evidence that the attack took place). Which of the following is used to perform "Google Hacking"? - Answers : Search operator What are the main phases in a typical "kill chain"? - Answers Planning, reconnaissance, weaponization / exploit, lateral discovery, data exfiltration, retreat.

Montrer plus Lire moins
Établissement
Infosec
Cours
Infosec










Oups ! Impossible de charger votre document. Réessayez ou contactez le support.

École, étude et sujet

Établissement
Infosec
Cours
Infosec

Infos sur le Document

Publié le
29 septembre 2025
Nombre de pages
30
Écrit en
2025/2026
Type
Examen
Contenu
Questions et réponses

Sujets

Aperçu du contenu

Infosec Exam Questions Answered Correctly Latest Update 2025-2026

What is an APT? - Answers Advanced Persistent Threat

True or false? Data exfiltration is always the last stage in a typical kill chain. - Answers False -
the attacker may maintain access or retreat (and attempt to destroy any evidence that the
attack took place).

Which of the following is used to perform "Google Hacking"? - Answers "Google Hacking" refers
to using search phrases to identify vulnerable services and devices on the web.

What is OSINT? - Answers Open Source Intelligence

Following the CompTIA Cybersecurity Analyst syllabus, which environmental reconnaissance
procdure has been omitted from the following list?



Topology discovery

OS fingerprinting / Service discovery

Packet capture

Log / router / firewall ACL review

Social media profiling

Social engineering

DNS harvesting

Phishing - Answers Email harvesting

Drag the marker representing the most appropriate tool to use to perform the following tasks
(use each tool ONCE only):



blankCorrect - perform a zone transfer.

blankCorrect - identify address autoconfiguration.

blankCorrect - test the local subnet for host responses.

blankCorrect - identify the path taken to communicate with a host.

blankCorrect - show the process using a listening port on the local host

,blankCorrect - identify the OS of a remote host. - Answers [nslookup] - perform a zone transfer.

[ipconfig] - identify address autoconfiguration.

[ping] - test the local subnet for host responses.

[tracert] - identify the path taken to communicate with a host.

[netstat] - show the process using a listening port on the local host

[nmap] - identify the OS of a remote host.

Write the command to use Nmap to scan IP addresses but suppress a port scan on the local
subnet if the local host is configured with IP address 172.16.17.48 and subnet mask
255.255.240.0 (for the purpose of this question, you must write the IP of the network address
rather than any of the valid host addresses): - Answers nmap -sn 172.16.16.0/20

Write the switch to add to an Nmap scan to record the path to the target: - Answers --traceroute
(or --tr)

True or false? You could use the command 'netstat -sp TCP' to check the number of reset
connections since the local Windows host last booted. - Answers true

Drag the label containing the switch over the appropriate marker to perform each of the
following Nmap scan types (use each label ONCE only or not at all):



blankCorrect - half-open scan.

blankCorrect - full connect scan.

blankCorrect - connectionless scan.

blankIncorrect - "Christmas Tree" scan. - Answers [‑sS] - half-open scan.

[‑sT] - full connect scan.

[‑sU] - connectionless scan.

[‑sX] - "Christmas Tree" scan.

A troubleshooting utility outputs a series of lines such as: "1 <10ms 1ms 10.1.0.1" - which utility
is being used? - Answers tracert

Why should a firewall be configured to block packets from an external network with source IP
addresses belonging to the internal network? - Answers : The packets must have spoofed IP
addresses

, What port on a firewall must be opened to allow an SSH connection to a web server? - Answers
22

What feature of a token-based authentication system makes it resistant to replay attacks? -
Answers The token is time stamped

Which of the following are fields in an Ethernet frame? - Answers CRC, Type

Which of the following password policies provides the BEST defense against a brute force
password guessing attack? - Answers Passwords must be at least 8 characters

Which protocol is used for Windows File and Printer Sharing? - Answers SMB

What is "NX"? - Answers Address space protection technology

Which of the following devices would be used for NAT? - Answers Router

True or false? Data exfiltration is always the last stage in a typical kill chain. - Answers False -
the attacker may maintain access or retreat (and attempt to destroy any evidence that the
attack took place).

Which of the following is used to perform "Google Hacking"? - Answers : Search operator

What are the main phases in a typical "kill chain"? - Answers Planning, reconnaissance,
weaponization / exploit, lateral discovery, data exfiltration, retreat.

What tools are available to perform passive environmental reconnaissance? - Answers Web
search ("Google Hacking"), email harvesting, social media harvesting, DNS harvesting, and
website ripping.

How is a ping sweep performed using native command line tools only? - Answers Using a script
to supply the variables (octet values) and loop through them.

What is an "axfr"? - Answers A DNS zone transfer (returning all the records in the zone) named
after the switches used to initiate it by the dig tool.

Describe one advantage and one disadvantage of using the -T0 switch when performing an
Nmap scan? - Answers This sets an extremely high delay between probes, which may help to
evade detection systems but will take a very long time to return results.

What additional information is returned if you run netstat with the -o switch on a Windows PC?
Would you expect the same result in Linux? - Answers The Process ID (PID) of the software that
initiated the connection. In Linux, -o controls timing; the -p switch returns the PID.

What is the principal challenge in scanning UDP ports? - Answers UDP does not send ACK
messages so the scan must use timeouts to interpret the port state. This makes scanning a
wide range of UDP ports a lengthy process
9,75 €
Accéder à l'intégralité du document:

Garantie de satisfaction à 100%
Disponible immédiatement après paiement
En ligne et en PDF
Tu n'es attaché à rien


Document également disponible en groupe

Faites connaissance avec le vendeur

Seller avatar
Les scores de réputation sont basés sur le nombre de documents qu'un vendeur a vendus contre paiement ainsi que sur les avis qu'il a reçu pour ces documents. Il y a trois niveaux: Bronze, Argent et Or. Plus la réputation est bonne, plus vous pouvez faire confiance sur la qualité du travail des vendeurs.
joshuawesonga22 Liberty University
S'abonner Vous devez être connecté afin de pouvoir suivre les étudiants ou les formations
Vendu
34
Membre depuis
8 mois
Nombre de followers
1
Documents
11081
Dernière vente
3 heures de cela
Tutor Wes

Hi there! I'm Tutor Wes, a dedicated tutor with a passion for sharing knowledge and helping others succeed academically. All my notes are carefully organized, detailed, and easy to understand. Whether you're preparing for exams, catching up on lectures, or looking for clear summaries, you'll find useful study materials here. Let’s succeed together!

3,3

3 revues

5
1
4
0
3
1
2
1
1
0

Récemment consulté par vous

Pourquoi les étudiants choisissent Stuvia

Créé par d'autres étudiants, vérifié par les avis

Une qualité sur laquelle compter : rédigé par des étudiants qui ont réussi et évalué par d'autres qui ont utilisé ce document.

Le document ne convient pas ? Choisis un autre document

Aucun souci ! Tu peux sélectionner directement un autre document qui correspond mieux à ce que tu cherches.

Paye comme tu veux, apprends aussitôt

Aucun abonnement, aucun engagement. Paye selon tes habitudes par carte de crédit et télécharge ton document PDF instantanément.

Student with book image

“Acheté, téléchargé et réussi. C'est aussi simple que ça.”

Alisha Student

Foire aux questions