Questions and Correct Answers (Verified
Answers) || LATEST UPDATE 2026||
GUARANTEED PASS
Penetration testers and security testers need technical skills to perform their duties
effectively.
T/F -CORRECTANSWER True
No matter what medium connects computers on network-copper wires, fiber-optic
cables, or a wireless setup; the same protocol must be running on all computers if
communication is going to function correctly.
T/F -CORRECTANSWER True
Malware is malicious software, such as a virus, worm, or Trojan program, introduced
into a network.
T/F -CORRECTANSWER True
Malware programs cannot be detected by antivirus programs.
,T/F -CORRECTANSWER False
A DDoS attack is launched against a host from a single server or workstation.
T/F -CORRECTANSWER False
Wget is a *nix system command that can be used to retrieve HTTP, HTTPS, and FTP
files over the Internet.
T/F -CORRECTANSWER True
Port scanning is a noninvasive, nondestructive, and legal testing procedure that is
protected by federal law.
T/F -CORRECTANSWER False
In the TCP/IP stack, the Transport layer includes network services and client software.
T/F -CORRECTANSWER False
Network attacks can often begin by gathering information from a company's Web site.
T/F -CORRECTANSWER True
, What type of testing procedure involves the tester(s) analyzing the company's security
policy and procedures, and reporting any vulnerabilities to management?
a. penetration test
b. security test
c. hacking test
d. ethical hacking test -CORRECTANSWER B. Security test
What specific term does the U.S. Department of Justice use to label all illegal access to
computer or network systems?
a. Hacking
b. Cracking
c. Security testing
d. Packet sniffing -CORRECTANSWER A. Hacking
What derogatory title do experienced hackers, who are skilled computer operators, give
to inexperienced hackers?
a. script kiddies
b. repetition monkeys
c. packet sniffers