Question: While validating a vulnerability, your colleague changes the password of the administrator account on the Windows Server she is examining (as proof of success). This

While validating a vulnerability, your colleague changes the password of the administrator account on the Windows Server she is examining (as proof of success). This is an example of what type of testing?

Select one:

a. Intrusive testing

b. Credentialed testing

c. Passive testing

d. Security control testing

Which of the following is the term used to refer to individuals who do not have the technical expertise to develop scripts or discover new vulnerabilities in software but who have just enough understanding of computer systems to be able to download and run scripts that others have developed?

Select one:

a. Script kiddies

b. Hackers

c. Simple intruders

d. Intermittent attackers

Which of the following is the term used to describe the processes used in the collection of information from public sources?

Select one:

a. Media exploitation

b. Open source intelligence

c. Social media intelligence

d. Social engineering

Youve been asked to perform an assessment of a new software application. Your client wants you to perform the assessment without providing you any information about how the software was developed or how data is processed by the application. This is an example of what type of testing?

Select one:

a. White box testing

b. Passive testing

c. Black box testing

d. Active testing

A colleague calls you to ask for assistance. He is having trouble keeping an attacker out of his network. He tells you no matter what he tries, he cant seem to keep the attacker out of his network and he has no idea how the attacker keeps getting in. This is an example of what kind of attack?

Select one:

a. Gray box attack

b. Whack-a-mole attack

c. Advanced persistent threat

d. Privilege escalation

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!