Question No : 1
Which of the following is typically identified during a vulnerability assessment?
정답:
Question No : 2
Which activity is outside the scope of an ethical hacker?
정답:
Question No : 3
What technique involves the social engineer pretending to be someone else to obtain sensitive information?
정답:
Question No : 4
Which term refers to an unauthorized device that connects to a wireless network?
정답:
Question No : 5
Which is the MOST effective countermeasure against social engineering attacks?
정답:
Question No : 6
Which attack targets the configuration and administration of the web server itself?
정답:
Question No : 7
In the context of information security, what does the 'CIA triad' stand for?
정답:
Question No : 8
Which of the following statements about SQL injection attacks is true?
정답:
Question No : 9
Containers offer a lightweight alternative to virtual machines by sharing the host OS's kernel.
What is a key security practice for containers?
정답:
Question No : 10
Which tool is widely used for password recovery by trying millions of combinations per second?
정답:
Question No : 11
Which type of attack exploits the trust that a site has in a user's browser?
정답:
Question No : 12
Which is a security challenge unique to IoT environments?
정답:
Question No : 13
What vulnerability is particularly concerning for IoT devices due to their widespread and often unattended deployment?
정답:
Question No : 14
Which attack involves overwhelming a web server with traffic, making it inaccessible to legitimate users?
정답:
Question No : 15
What is an effective countermeasure against wireless sniffing?
정답: