OA Exams

  • web.groovymark@gmail.com
  • December 5, 2024

Question 41

Explain OSINT tool Recon-ng (CLI):

a) A vulnerability scanning tool for web applications
b) A more robust version of TheHarvester, gathering additional information like DNS and files
c) A graphical interface for metadata extraction
d) A tool for mapping network topologies

Correct Answer: A more robust version of TheHarvester, gathering additional information like DNS and files

Explanation: Recon-ng is an open-source tool that extends the capabilities of TheHarvester, providing additional features for DNS enumeration and file crawling.

Question 42

Describe Maltego (GUI):

a) A tool for encrypting documents
b) A social engineering attack simulation tool
c) A data analysis tool that uses “transforms” to automate data gathering and visualization
d) A software used for securing networks

Correct Answer: A data analysis tool that uses "transforms" to automate data gathering and visualization

Explanation: Maltego uses "transforms" to collect and analyze data from public sources, then displays the data in graphs that show relationships between entities.

Question 43

Explain pretexting:

a) A method to validate credentials before granting access
b) A social engineering tactic that involves presenting false information to manipulate someone into giving access
c) A form of phishing aimed at gathering login details
d) A technique to test firewall

Correct Answer: A social engineering tactic that involves presenting false information to manipulate someone into giving access

Explanation: Pretexting is a form of social engineering in which the attacker fabricates a story or pretext to gain the trust of the victim and extract confidential information.

Question 44

Explain elicitation:

a) A method of socially engineering a target to obtain direct access
b) A tactic used to passively collect information without the target knowing
c) A technique for injecting malware into a system
d) A method for configuring firewalls

Correct Answer: A tactic used to passively collect information without the target knowing

Explanation: Elicitation involves obtaining information from a target without directly asking for it, often using casual conversation or indirect means.

Question 45

What is BEC (Business Email Compromise)?

a) A method of encrypting emails for secure communication
b) A type of phishing attack in which attackers use email to impersonate business leaders
c) A technique for auditing corporate networks
d) A form of malware targeting corporate email servers

Correct Answer: A type of phishing attack in which attackers use email to impersonate business leaders

Explanation: BEC attacks involve attackers posing as business executives via email to manipulate employees into transferring money or sensitive dat

Question 46

xplain a hoax:

a) A phishing attempt that infects users with ransomware
b) A form of malicious communication that tricks users into taking undesired actions
c) A sophisticated hacking attempt on web applications
d) A malware scanning tool

Correct Answer: A form of malicious communication that tricks users into taking undesired actions

Explanation: Hoaxes use fake communications to deceive users into taking actions that may harm their systems or result in data loss.

Question 47

What is the Social Engineering Toolkit (SET)?

a) A tool used to detect social engineering attacks
b) A collection of tools in Kali Linux designed for social engineering attacks like phishing
c) A tool for securing email communications
d) A framework for vulnerability scanning

Correct Answer: A collection of tools in Kali Linux designed for social engineering attacks like phishing

Explanation: SET (Social Engineering Toolkit) helps attackers create phishing campaigns and malicious payloads to exploit human vulnerabilities in security.

Question 48

Explain pharming:

a) Infecting websites with malware
b) Redirecting users to a fake website that looks legitimate to steal their credentials
c) A method to track malware
d) Using social engineering to gather login details

Correct Answer: Redirecting users to a fake website that looks legitimate to steal their credentials

Explanation: In pharming, attackers create fake websites that mimic legitimate ones, tricking users into entering their credentials.

Question 49

Explain baiting:

a) Infecting networks with malware
b) Leaving infected physical media in a location for someone to find and use
c) Using email to manipulate users into downloading malware
d) A way to scan for open ports on a network

Correct Answer: Leaving infected physical media in a location for someone to find and use

Explanation: Baiting involves planting infected media, such as USB drives, in accessible locations where victims are likely to insert them into their computers.

Question 50

 What are vishing and SPIT?

a) Two techniques for scanning network vulnerabilities
b) Techniques for phone-based social engineering attacks
c) Tools for analyzing malware behavior
d) Methods for bypassing firewalls

Correct Answer: Techniques for phone-based social engineering attacks

Explanation: Vishing is voice phishing where attackers extract information over the phone, and SPIT (Spam over Internet Telephony) is unsolicited voice messages sent over VoIP services.

Complete the Captcha to view next question set.

Prev Post
WGU D332 Practice Exam Questions – Set 1 – Part 2
Next Post
WGU D196 Practice Exam Questions – Set 1 – Part 2