GUIDE 2026 COMPLETE QUESTIONS AND
SOLUTIONS VERIFIED A+
● Google Search Operator site:domain. Answer: Returns results only
from the specified domain
● Google Search Parameter pws=0. Answer: Turns off Google search
personalization
● STIX (Structured Threat Information eXpression). Answer: A
standardized format for sharing cyber threat intelligence data
● STIX Data Format. Answer: Commonly represented in JSON objects
describing threats
● TAXII (Trusted Automated Exchange of Intelligence Information).
Answer: Protocol used to exchange cyber threat intelligence over
HTTPS
● GPO (Group Policy Object). Answer: Windows administrative tool
used to centrally deploy configuration settings across multiple devices
, ● Passive Reconnaissance. Answer: Gathering information about a target
without directly interacting with its systems
● Banner Grabbing. Answer: Active reconnaissance technique used to
identify services and versions running on a system
● False Positive in Vulnerability Scan. Answer: A reported vulnerability
that does not actually exist
● Low / Informational Vulnerability Scan Results. Answer: Often
indicators of false positives
● ScoutSuite. Answer: Tool used to audit multi-cloud environments
● Prowler. Answer: Cloud security auditing tool primarily for AWS
● Diamond Model of Intrusion Analysis. Answer: Framework that
graphically depicts attacker behavior using adversary, capability,
infrastructure, and victim
● Output Encoding. Answer: Translating special characters into safe
representations to prevent injection attacks