Daily Multiple Choice Test

When an OSI layer 8 issue has been identified, where is the issue??
The issue is the individual person on the computer
The issue is the web application technology
The issue is the cabled network not working
The issue is the wireless network not working
The issue is the individual person on the computer
Which BurpSuite feature can decode Base64
Decoder
Intruder
Repeater
none
Decoder
Which of these is the TCP 3 way handshake?
SYN | SYN-ACK | ACK
SYN, SYN, ACK
SYN | SYN | SYN-ACK
SYN, SYN-ACK, SYN-ACK
SYN | SYN-ACK | ACK
What does PII stand for
Personally Identifiable Information
Protected Identity Information
Personal Identity Information
Private Information Instance
Personally Identifiable Information
Which of the following commands would brute force files on a tftp server?
tftpbrute.pl <IP> wordlist.txt
tftp <IP> -I wordlist.txt
tftp <IP> -w wordlist.txt
tftpscan.py <IP> wordlist.txt
tftpbrute.pl <IP> wordlist.txt
Under CMA is it a crime to view the source code of a web application
no
yes
yes if its encoded
yes if it uses TLS
no
What is typically the slowest scan
UDP scan
pingsweep
TCP Scan
SYN Scan
UDP scan
Connecting to a WPA network requires what
a 4 way handshake
a 3 way handshake
an asynchronous handshake
a 7 stage handshake
a 4 way handshake
What does CVSS stand for
Common Vulnerability Scoring System
Common Vulnerability Scoring Standard
Credential Value Setting Store
Common Value System Setting
Common Vulnerability Scoring System
Which BurpSuite feature can be used execute a brute force attack
Intruder
Repeater
Decoder
Proxy
Intruder
Your Score
Score Label
Score Summary