D484 / D 484 Objective Assessment Lesson 1 – 20 (Latest Update 2025 / 2026) Penetration Testing | Study Guide Questions and Answers | Grade A | 100% Correct (Verified Solutions) - WGU
Question:
Kismet
Answer:
Included with Kali Linux, can capture packets and also act as a wireless IDS.
Question:
Wifite2
Answer:
a wireless auditing tool you can use to assess the WLAN
- / 4
Question:
Authoritative Transfer (AXFR)
Answer:
Sometimes called a DNS Zone Transfer
Question:
on path attack
Answer:
Attack where the threat actor makes an independent connection between two victims and is able to read and possibly modify traffic.
Question:
living off the land (LoTL)
Answer:
Exploit techniques that use standard system tools and packages to perform intrusions.
- / 4
Question:
Fileless Malware
Answer:
Malware that does not need to be installed by the user because it uses legitimate programs that are already installed to infect a computer
Question:
sed (stream editor)
Answer:
Has the ability to search, find, delete, replace, insert, or edit without having to open the file.
Question:
Incognito
Answer:
type of attack which allows you to impersonate user tokens after you have compromised a system
- / 4
Question:
(MACE)
Answer:
a file's modification, access, created, and entry modified
Question:
cipher.exe
Answer:
Windows has a built in command, called cipher.exe, that can securely delete a file.
Question:
lifecycle of a vulnerability
Answer:
A process that moves from the initial discovery of a vulnerability, through coordination, mitigation, management, and documentation.
- / 4