CompTIA Security+ SY0-501 - Penetration Testing and Vulnerability Scanning Quiz

Exit

Question 1 of 1

  Time Left


0 [{"id":382040,"quiz_id":"19620","answer_id":null,"answerType_id":"0","created_at":"2018-02-20 01:29:43","updated_at":"2018-02-20 01:37:58","questionName":"After which one of the following system events would malicious code or scripts most likely not be persistent?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":1,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":382038,"quiz_id":"19620","answer_id":null,"answerType_id":"2","created_at":"2018-02-20 01:28:47","updated_at":"2018-02-20 01:37:58","questionName":"Match the application testing type with the characteristics.","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":0,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":382049,"quiz_id":"19620","answer_id":null,"answerType_id":"0","created_at":"2018-02-20 01:36:08","updated_at":"2018-02-20 01:37:58","questionName":"What is the alternate term used for piggybacking through a secured door?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":7,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":382032,"quiz_id":"19620","answer_id":null,"answerType_id":"2","created_at":"2018-02-20 01:10:28","updated_at":"2018-02-20 01:37:58","questionName":"Place the steps in the correct order to prepare for a penetration testing session in your accounting department.","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":11,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":382045,"quiz_id":"19620","answer_id":null,"answerType_id":"0","created_at":"2018-02-20 01:32:40","updated_at":"2018-02-20 01:37:58","questionName":"Which of the following actions would most likely lead to common security misconfigurations at layer 2 of the OSI model?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":4,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":382033,"quiz_id":"19620","answer_id":null,"answerType_id":"0","created_at":"2018-02-20 01:11:48","updated_at":"2018-02-20 01:37:58","questionName":"With respect to the identification of a lack of security controls in an enterprise, which of the following is false?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":12,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":382031,"quiz_id":"19620","answer_id":null,"answerType_id":"0","created_at":"2018-02-20 01:08:37","updated_at":"2018-02-20 01:37:58","questionName":"Which statements are true with respect to the process of passively testing security controls?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":10,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":382043,"quiz_id":"19620","answer_id":null,"answerType_id":"0","created_at":"2018-02-20 01:31:15","updated_at":"2018-02-20 01:37:58","questionName":"Which activities are included when performing penetration testing?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":3,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":382048,"quiz_id":"19620","answer_id":null,"answerType_id":"0","created_at":"2018-02-20 01:35:29","updated_at":"2018-02-20 01:37:58","questionName":"Which of the following events best represents a false positive scenario?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":6,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":382046,"quiz_id":"19620","answer_id":null,"answerType_id":"0","created_at":"2018-02-20 01:33:29","updated_at":"2018-02-20 01:37:58","questionName":"Which one of the following is not a popular vulnerability scanning tool?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":5,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":382034,"quiz_id":"19620","answer_id":null,"answerType_id":"0","created_at":"2018-02-20 01:16:15","updated_at":"2018-02-20 01:37:58","questionName":"Which statement concerning the pen testing and vulnerability scanning comparisons is false?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":13,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":382051,"quiz_id":"19620","answer_id":null,"answerType_id":"2","created_at":"2018-02-20 01:37:29","updated_at":"2018-02-20 01:37:58","questionName":"Match the network security testing type with the characteristics.","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":8,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":382030,"quiz_id":"19620","answer_id":null,"answerType_id":"0","created_at":"2018-02-20 01:06:51","updated_at":"2018-02-20 01:37:58","questionName":"Which form of exploit allows you to jump from one segment or domain to another in order to deliver a payload?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":9,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":382041,"quiz_id":"19620","answer_id":null,"answerType_id":"0","created_at":"2018-02-20 01:30:34","updated_at":"2018-02-20 01:37:58","questionName":"Which of the following best represents an example of passive reconnaissance?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":2,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null}]
382040
0
60
block

After which one of the following system events would malicious code or scripts most likely not be persistent?

Select the correct answer(s).  

(0/0)












382038
0
60
none
382049
0
60
none
382032
0
60
none
382045
0
60
none
382033
0
120
none
382031
0
120
none
382043
0
60
none
382048
0
60
none
382046
0
60
none
382034
0
120
none
382051
0
60
none
382030
0
60
none
382041
0
60
none