00:00

QUESTION 106

- (Topic 1)
A hacker is an intelligent individual with excellent computer skills and the ability to explore a computer??s software and hardware without the owner??s permission. Their intention can either be to simply gain knowledge or to illegally make changes.
Which of the following class of hacker refers to an individual who works both offensively and defensively at various times?

Correct Answer: C

QUESTION 107

- (Topic 3)
Mirai malware targets loT devices. After infiltration, it uses them to propagate and create botnets that then used to launch which types of attack?

Correct Answer: C

QUESTION 108

- (Topic 1)
What is the minimum number of network connections in a multihomed firewall?

Correct Answer: A

QUESTION 109

- (Topic 3)
Mary found a high vulnerability during a vulnerability scan and notified her server team. After analysis, they sent her proof that a fix to that issue had already been applied. The vulnerability that Marry found is called what?

Correct Answer: B
https://www.infocyte.com/blog/2019/02/16/cybersecurity-101-what-you-need-to-know- about-false-positives-and-false-negatives/
False positives are mislabeled security alerts, indicating there is a threat when in actuality, there isn??t. These false/non-malicious alerts (SIEM events) increase noise for already over- worked security teams and can include software bugs, poorly written software, or unrecognized network traffic.
False negatives are uncaught cyber threats — overlooked by security tooling because they??re dormant, highly sophisticated (i.e. file-less or capable of lateral movement) or the security infrastructure in place lacks the technological ability to detect these attacks.

QUESTION 110

- (Topic 3)
What would be the purpose of running "wget 192.168.0.15 -q -S" against a web server?

Correct Answer: B
-q, --quiet quiet (no output)
-S, --server-response print server response