INTERMEDIATE LEVEL QUIZ
0 of 18 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 18 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
| Average score |
|
| Your score |
|
The following steps describe the process for which type of attack?
Which of the following are considered DNS hardening techniques?
An attacker has performed a privilege escalation attack on your system. Which of the following is MOST likely the goal behind this attack?
Which of the following describes the worst possible action an IDS can take?
Which of the following BEST describes the verification phase of the vulnerability management life cycle?
Which of the following devices can monitor a network and detect potential security attacks?
While performing a password audit on a Windows machine in your organization with L0phtCrack, you receive the following results. Based on what you see below, which two accounts should worry you the most? (Select two.)

Which BEST defines the term base in CVSS?
Which of the following tools would you use to perform a SYN flood attack?
Which of the following BEST describes Bluetooth MAC spoofing?
Which tool BEST fits into the banner grabbing prevention category?
Which frequency does ZigBee operate at?
As a security analyst working for an accounting firm, you need to evaluate the current environment. Which of the following is the FIRST thing you should do?
A hacker has used a SQL injection to deface a web page by inserting malicious content and altering the contents of the database. Which of the following did the hacker accomplish?
Which of the following government resources is a dictionary of known patterns of cyberattacks used by hackers?
A security analyst is testing to find SQL injection vulnerabilities. She uses automation of a large volume of random data inserted into the web application’s input fields in order to check the output. Which type of testing was done?
You are a security analyst at a medical clinic and want to evaluate the environment. Which of the following is the first thing you should do?
Which of the following attacks involves modifying the IP packet header and source address to make it look like they are coming from a trusted source?
WhatsApp us