• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

Lesson 1 20 Latest Update Penetration Testing Study

QUESTIONS & ANSWERS Dec 16, 2025 ★★★★★ (5.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

D484 / D 484 Objective Assessment Lesson 1 – 20 (Latest Update 2025 / 2026) Penetration Testing | Study Guide Questions and Answers | Grade A | 100% Correct (Verified Solutions) - WGU

Question:

Kismet

Answer:

Included with Kali Linux, can capture packets and also act as a wireless IDS.

Question:

Wifite2

Answer:

a wireless auditing tool you can use to assess the WLAN

  • / 4

Question:

Authoritative Transfer (AXFR)

Answer:

Sometimes called a DNS Zone Transfer

Question:

on path attack

Answer:

Attack where the threat actor makes an independent connection between two victims and is able to read and possibly modify traffic.

Question:

living off the land (LoTL)

Answer:

Exploit techniques that use standard system tools and packages to perform intrusions.

  • / 4

Question:

Fileless Malware

Answer:

Malware that does not need to be installed by the user because it uses legitimate programs that are already installed to infect a computer

Question:

sed (stream editor)

Answer:

Has the ability to search, find, delete, replace, insert, or edit without having to open the file.

Question:

Incognito

Answer:

type of attack which allows you to impersonate user tokens after you have compromised a system

  • / 4

Question:

(MACE)

Answer:

a file's modification, access, created, and entry modified

Question:

cipher.exe

Answer:

Windows has a built in command, called cipher.exe, that can securely delete a file.

Question:

lifecycle of a vulnerability

Answer:

A process that moves from the initial discovery of a vulnerability, through coordination, mitigation, management, and documentation.

  • / 4

User Reviews

★★★★★ (5.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★★

I was amazed by the practical examples in this document. It enhanced my understanding. Truly remarkable!

Download Document

Buy This Document

$1.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: QUESTIONS & ANSWERS
Added: Dec 16, 2025
Description:

D484 / D 484 Objective Assessment Lesson 1 – 20 (Latest Update) Penetration Testing | Study Guide Questions and Answers | Grade A | 100% Correct (Verified Solutions) - WGU Question: Kismet Answer...

Unlock Now
$ 1.00