SOLUTION 2026 GUARANTEED TO PASS
◍ What is a functional business requirement? Answer: Describes
behaviors for how a system should work.
◍ What is a non-functional business requirement? Answer: Describes
how a system behaves and any limits to its functionality.
◍ What is Nmap? Answer: Open source network vulnerability
scanner.
◍ What is Zenmap? Answer: GUI interface for Nmap.
◍ What is Kali Linux? Answer: Linux distribution for digital
forensics and penetration testing.
◍ What is Metasploit? Answer: Penetration testing framework used
with Kali Linux.
◍ What is OpenVAS? Answer: Open vulnerability scanner with
50,000 vulnerabilities.
, ◍ What is a SQL injection attack? Answer: Code injection technique
that exploits SQL database vulnerability.
◍ What is pen testing? Answer: Ethical hacking to uncover system
vulnerabilities.
◍ Who are ethical hackers? Answer: White hat hackers who hack
ethically to improve defense.
◍ What is ad hoc testing? Answer: Vulnerability scan for less
apparent vulnerabilities.
◍ What is footprinting? Answer: Identifying organizational phone
numbers.
◍ What is penetration testing? Answer: Mimicking real-world attacks
to gain system access.
◍ What is preparation in the context of security? Answer:
Determining vulnerabilities of various modems.
◍ What is SQL injection? Answer: Code injection to reveal weak
spots in SQL database.
◍ What is social engineering? Answer: Tricking someone into
revealing damaging information.