• 1. 
    Choose the answer that best reflects the Bash command format.

  • command option argument
  • argument option command
  • command argument option
  • all of the above
  • 2. 
    Personal Information

  • PII (Personally Identifiable Information)
  • TOE (Target of Evaluation)
  • OSINT (Open Source Intelligence)
  • Zero Day
  • 3. 
    Reads contents of a file and allows navigation

  • cd
  • mkdir
  • cat
  • less
  • 4. 
    Scanning a target IP Range for OS version (information gathering) falls under what pentesting phase?

  • Pre-Attack
  • Attack
  • Post Attack
  • Reconnaissance
  • 5. 
    Navigates to a directory

  • cd
  • mkdir
  • chmod
  • cat
  • 6. 
    Which data law gives you more rights?

  • Data Protection Act
  • GDPR
  • 7. 
    Open Source Intelligence

  • Hack Value
  • Daisy Chaining
  • PII
  • OSINT
  • 8. 
    Using discovered information to breach several systems.

  • Zero Day
  • Daisy Chaining
  • OSINT
  • TOE
  • 9. 
    Two-factor authentication helps you...

  • Encrypt your data
  • Makes it harder to break into a system
  • Backs up a system
  • Makes it easier to break into a system
  • 10. 
    Opens the current working directory in the GUI

  • cd
  • mkdir
  • xdg-open .
  • less
  • 11. 
    Create single or multiple files, view contents of a file

  • cd
  • cat
  • chmod
  • xdg-open
  • 12. 
    What clause of the police and justice act relates to DoS attacks?

  • 39
  • 40
  • 41
  • 42
  • 13. 
    Vulnerability without a patch

  • PII
  • Zero Day
  • Hack Value
  • Daisy Chaining
Report Question
warning
access_time
  Time