CySA+ CS0-001 – Q. 416

3
794

Which of the following is the use of tools to simulate the ability for an attacker to gain access to a specified network?

A. Reverse engineering
B. Fuzzing
C. Penetration testing
D. Network mapping

3 COMMENTS

  1. 14. Which of the following defines the components of a penetration test?
    a. Executive summary
    b. After-action report
    c. Rules of engagement
    d. Confidentiality agreement.

  2. 16. A cybersecurity is trying to determine the OS of an unidentified devices on the network. A scan produces the following results.

    PORT STATE SERVICE
    135/TCP OPEN rcp
    139/TCP OPEN netbios-sen
    445/TCP OPEN ds
    3389/TCP OPEN tern-serv
    4445/TCP OPEN upnotifyp
    1400/TCP OPEN scoty-ft

    WHICH OF THE FOLLOWING IS THE MOST LIKELY UNKNOWN DEVICE OPERATING SYSTEM?
    a. Windows
    b. Linux
    c. Solaris
    d. FreeBSD
    e. MacOS

LEAVE A REPLY

Please enter your comment!
Please enter your name here