{"id":108772,"date":"2025-08-14T08:21:14","date_gmt":"2025-08-14T08:21:14","guid":{"rendered":"https:\/\/www.dumpsbase.com\/freedumps\/?p=108772"},"modified":"2025-08-14T08:21:14","modified_gmt":"2025-08-14T08:21:14","slug":"gain-success-in-your-crest-practitioner-security-analyst-cpsa-exam-with-the-most-current-crest-cpsa-dumps-v8-02","status":"publish","type":"post","link":"https:\/\/www.dumpsbase.com\/freedumps\/gain-success-in-your-crest-practitioner-security-analyst-cpsa-exam-with-the-most-current-crest-cpsa-dumps-v8-02.html","title":{"rendered":"Gain Success in Your CREST Practitioner Security Analyst (CPSA) Exam with the Most Current CREST-CPSA Dumps (V8.02)"},"content":{"rendered":"<p>We know that the CREST Practitioner Security Analyst (CPSA) is an entry-level exam that tests your knowledge in assessing operating systems and common network services. If you are searching for the right study resources to make preparations, come to DumpsBase and gain success with the most current CREST-CPSA dumps (V8.02). Based on the CREST-CPSA exam content, we have collected 154 exam questions and answers in total. They have been verified by professionals, ensuring you&#8217;re studying documentation that reflects the actual exam. By practicing with CREST-CPSA dumps (V8.02), you can assess your knowledge, identify weak areas, and improve your duration management skills. Choose DumpsBase today. With regular practice, you&#8217;ll build the self-belief needed to tackle the <a href=\"https:\/\/www.dumpsbase.com\/crest.html\"><em><strong>CREST<\/strong><\/em><\/a> Practitioner Security Analyst (CPSA) exam successfully.<\/p>\n<h2>Below are the <span style=\"background-color: #00ff00;\"><em>CREST-CPSA free dumps online<\/em><\/span>, helping you check the quality first:<\/h2>\n<script>\n\t  window.fbAsyncInit = function() {\n\t    FB.init({\n\t      appId            : '622169541470367',\n\t      autoLogAppEvents : true,\n\t      xfbml            : true,\n\t      version          : 'v3.1'\n\t    });\n\t  };\n\t\n\t  (function(d, s, id){\n\t     var js, fjs = d.getElementsByTagName(s)[0];\n\t     if (d.getElementById(id)) {return;}\n\t     js = d.createElement(s); js.id = id;\n\t     js.src = \"https:\/\/connect.facebook.net\/en_US\/sdk.js\";\n\t     fjs.parentNode.insertBefore(js, fjs);\n\t   }(document, 'script', 'facebook-jssdk'));\n\t<\/script><script type=\"text\/javascript\" >\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \nif(!window.jQuery) alert(\"The important jQuery library is not properly loaded in your site. Your WordPress theme is probably missing the essential wp_head() call. You can switch to another theme and you will see that the plugin works fine and this notice disappears. If you are still not sure what to do you can contact us for help.\");\n});\n<\/script>  \n  \n<div  id=\"watupro_quiz\" class=\"quiz-area single-page-quiz\">\n<p id=\"submittingExam10682\" style=\"display:none;text-align:center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\"><\/p>\n\n<div class=\"watupro-exam-description\" id=\"description-quiz-10682\"><\/div>\n\n<form action=\"\" method=\"post\" class=\"quiz-form\" id=\"quiz-10682\"  enctype=\"multipart\/form-data\" >\n<div class='watu-question ' id='question-1' style=';'><div id='questionWrap-1'  class='   watupro-question-id-422266'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>1. <\/span>What is the main purpose of an interim report during an assessment?<\/div><input type='hidden' name='question_id[]' id='qID_1' value='422266' \/><input type='hidden' id='answerType422266' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422266[]' id='answer-id-1635165' class='answer   answerof-422266 ' value='1635165'   \/><label for='answer-id-1635165' id='answer-label-1635165' class=' answer'><span>To serve as the final report if testing is interrupted<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422266[]' id='answer-id-1635166' class='answer   answerof-422266 ' value='1635166'   \/><label for='answer-id-1635166' id='answer-label-1635166' class=' answer'><span>To alert the client to critical issues requiring immediate attention<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422266[]' id='answer-id-1635167' class='answer   answerof-422266 ' value='1635167'   \/><label for='answer-id-1635167' id='answer-label-1635167' class=' answer'><span>To summarize tool output before analysis<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422266[]' id='answer-id-1635168' class='answer   answerof-422266 ' value='1635168'   \/><label for='answer-id-1635168' id='answer-label-1635168' class=' answer'><span>To document scope changes<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-2' style=';'><div id='questionWrap-2'  class='   watupro-question-id-422267'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>2. <\/span>Which protocol version is considered insecure and deprecated in modern web encryption?<\/div><input type='hidden' name='question_id[]' id='qID_2' value='422267' \/><input type='hidden' id='answerType422267' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422267[]' id='answer-id-1635169' class='answer   answerof-422267 ' value='1635169'   \/><label for='answer-id-1635169' id='answer-label-1635169' class=' answer'><span>TLS 1.3<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422267[]' id='answer-id-1635170' class='answer   answerof-422267 ' value='1635170'   \/><label for='answer-id-1635170' id='answer-label-1635170' class=' answer'><span>TLS 1.2<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422267[]' id='answer-id-1635171' class='answer   answerof-422267 ' value='1635171'   \/><label for='answer-id-1635171' id='answer-label-1635171' class=' answer'><span>SSL 3.0<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422267[]' id='answer-id-1635172' class='answer   answerof-422267 ' value='1635172'   \/><label for='answer-id-1635172' id='answer-label-1635172' class=' answer'><span>HTTPS 2.0<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-3' style=';'><div id='questionWrap-3'  class='   watupro-question-id-422268'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>3. <\/span>Which HTTP status code is often returned with a detailed application error stack trace in misconfigured environments?<\/div><input type='hidden' name='question_id[]' id='qID_3' value='422268' \/><input type='hidden' id='answerType422268' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422268[]' id='answer-id-1635173' class='answer   answerof-422268 ' value='1635173'   \/><label for='answer-id-1635173' id='answer-label-1635173' class=' answer'><span>302 Found<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422268[]' id='answer-id-1635174' class='answer   answerof-422268 ' value='1635174'   \/><label for='answer-id-1635174' id='answer-label-1635174' class=' answer'><span>200 OK<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422268[]' id='answer-id-1635175' class='answer   answerof-422268 ' value='1635175'   \/><label for='answer-id-1635175' id='answer-label-1635175' class=' answer'><span>500 Internal Server Error<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422268[]' id='answer-id-1635176' class='answer   answerof-422268 ' value='1635176'   \/><label for='answer-id-1635176' id='answer-label-1635176' class=' answer'><span>403 Forbidden<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-4' style=';'><div id='questionWrap-4'  class='   watupro-question-id-422269'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>4. <\/span>What HTTP status code typically indicates that a discovered URL exists but requires authentication?<\/div><input type='hidden' name='question_id[]' id='qID_4' value='422269' \/><input type='hidden' id='answerType422269' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422269[]' id='answer-id-1635177' class='answer   answerof-422269 ' value='1635177'   \/><label for='answer-id-1635177' id='answer-label-1635177' class=' answer'><span>200 OK<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422269[]' id='answer-id-1635178' class='answer   answerof-422269 ' value='1635178'   \/><label for='answer-id-1635178' id='answer-label-1635178' class=' answer'><span>403 Forbidden<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422269[]' id='answer-id-1635179' class='answer   answerof-422269 ' value='1635179'   \/><label for='answer-id-1635179' id='answer-label-1635179' class=' answer'><span>401 Unauthorized<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422269[]' id='answer-id-1635180' class='answer   answerof-422269 ' value='1635180'   \/><label for='answer-id-1635180' id='answer-label-1635180' class=' answer'><span>302 Found<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-5' style=';'><div id='questionWrap-5'  class='   watupro-question-id-422270'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>5. <\/span>What protocol is primarily used by Active Directory for directory services?<\/div><input type='hidden' name='question_id[]' id='qID_5' value='422270' \/><input type='hidden' id='answerType422270' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422270[]' id='answer-id-1635181' class='answer   answerof-422270 ' value='1635181'   \/><label for='answer-id-1635181' id='answer-label-1635181' class=' answer'><span>RDP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422270[]' id='answer-id-1635182' class='answer   answerof-422270 ' value='1635182'   \/><label for='answer-id-1635182' id='answer-label-1635182' class=' answer'><span>LDAP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422270[]' id='answer-id-1635183' class='answer   answerof-422270 ' value='1635183'   \/><label for='answer-id-1635183' id='answer-label-1635183' class=' answer'><span>HTTP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422270[]' id='answer-id-1635184' class='answer   answerof-422270 ' value='1635184'   \/><label for='answer-id-1635184' id='answer-label-1635184' class=' answer'><span>DNS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-6' style=';'><div id='questionWrap-6'  class='   watupro-question-id-422271'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>6. <\/span>Which file, when misconfigured, can allow passwordless login using RSH or RLOGIN?<\/div><input type='hidden' name='question_id[]' id='qID_6' value='422271' \/><input type='hidden' id='answerType422271' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422271[]' id='answer-id-1635185' class='answer   answerof-422271 ' value='1635185'   \/><label for='answer-id-1635185' id='answer-label-1635185' class=' answer'><span>\/etc\/shadow<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422271[]' id='answer-id-1635186' class='answer   answerof-422271 ' value='1635186'   \/><label for='answer-id-1635186' id='answer-label-1635186' class=' answer'><span>\/etc\/hosts.deny<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422271[]' id='answer-id-1635187' class='answer   answerof-422271 ' value='1635187'   \/><label for='answer-id-1635187' id='answer-label-1635187' class=' answer'><span>\/etc\/passwd<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422271[]' id='answer-id-1635188' class='answer   answerof-422271 ' value='1635188'   \/><label for='answer-id-1635188' id='answer-label-1635188' class=' answer'><span>.rhosts<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-7' style=';'><div id='questionWrap-7'  class='   watupro-question-id-422272'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>7. <\/span>A well-configured Checkpoint Firewall is running on your local network segment. <br \/>\r<br>Which of the following types of probe is it most likely to respond to?<\/div><input type='hidden' name='question_id[]' id='qID_7' value='422272' \/><input type='hidden' id='answerType422272' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422272[]' id='answer-id-1635189' class='answer   answerof-422272 ' value='1635189'   \/><label for='answer-id-1635189' id='answer-label-1635189' class=' answer'><span>A ICMP Echo request<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422272[]' id='answer-id-1635190' class='answer   answerof-422272 ' value='1635190'   \/><label for='answer-id-1635190' id='answer-label-1635190' class=' answer'><span>An ARP 'who has' request<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422272[]' id='answer-id-1635191' class='answer   answerof-422272 ' value='1635191'   \/><label for='answer-id-1635191' id='answer-label-1635191' class=' answer'><span>It will not respond to any type of probe<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422272[]' id='answer-id-1635192' class='answer   answerof-422272 ' value='1635192'   \/><label for='answer-id-1635192' id='answer-label-1635192' class=' answer'><span>A TCP SYN packet to TCP port 264<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422272[]' id='answer-id-1635193' class='answer   answerof-422272 ' value='1635193'   \/><label for='answer-id-1635193' id='answer-label-1635193' class=' answer'><span>An IKE probe to UDP port 500<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-8' style=';'><div id='questionWrap-8'  class='   watupro-question-id-422273'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>8. <\/span>Which of the following wireless encryption protocols is considered secure for enterprise use?<\/div><input type='hidden' name='question_id[]' id='qID_8' value='422273' \/><input type='hidden' id='answerType422273' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422273[]' id='answer-id-1635194' class='answer   answerof-422273 ' value='1635194'   \/><label for='answer-id-1635194' id='answer-label-1635194' class=' answer'><span>WEP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422273[]' id='answer-id-1635195' class='answer   answerof-422273 ' value='1635195'   \/><label for='answer-id-1635195' id='answer-label-1635195' class=' answer'><span>WPA<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422273[]' id='answer-id-1635196' class='answer   answerof-422273 ' value='1635196'   \/><label for='answer-id-1635196' id='answer-label-1635196' class=' answer'><span>WPA2-Enterprise<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422273[]' id='answer-id-1635197' class='answer   answerof-422273 ' value='1635197'   \/><label for='answer-id-1635197' id='answer-label-1635197' class=' answer'><span>WPA2-Personal with TKIP<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-9' style=';'><div id='questionWrap-9'  class='   watupro-question-id-422274'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>9. <\/span>Which command-line tool is used on Windows to enumerate users from the local system or domain?<\/div><input type='hidden' name='question_id[]' id='qID_9' value='422274' \/><input type='hidden' id='answerType422274' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422274[]' id='answer-id-1635198' class='answer   answerof-422274 ' value='1635198'   \/><label for='answer-id-1635198' id='answer-label-1635198' class=' answer'><span>whoami<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422274[]' id='answer-id-1635199' class='answer   answerof-422274 ' value='1635199'   \/><label for='answer-id-1635199' id='answer-label-1635199' class=' answer'><span>net user \/domain<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422274[]' id='answer-id-1635200' class='answer   answerof-422274 ' value='1635200'   \/><label for='answer-id-1635200' id='answer-label-1635200' class=' answer'><span>ipconfig<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422274[]' id='answer-id-1635201' class='answer   answerof-422274 ' value='1635201'   \/><label for='answer-id-1635201' id='answer-label-1635201' class=' answer'><span>netstat<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-10' style=';'><div id='questionWrap-10'  class='   watupro-question-id-422275'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>10. <\/span>Which HTTP method is used by web servers to retrieve data without making changes to server-side resources?<\/div><input type='hidden' name='question_id[]' id='qID_10' value='422275' \/><input type='hidden' id='answerType422275' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422275[]' id='answer-id-1635202' class='answer   answerof-422275 ' value='1635202'   \/><label for='answer-id-1635202' id='answer-label-1635202' class=' answer'><span>POST<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422275[]' id='answer-id-1635203' class='answer   answerof-422275 ' value='1635203'   \/><label for='answer-id-1635203' id='answer-label-1635203' class=' answer'><span>PUT<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422275[]' id='answer-id-1635204' class='answer   answerof-422275 ' value='1635204'   \/><label for='answer-id-1635204' id='answer-label-1635204' class=' answer'><span>GET<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422275[]' id='answer-id-1635205' class='answer   answerof-422275 ' value='1635205'   \/><label for='answer-id-1635205' id='answer-label-1635205' class=' answer'><span>DELETE<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-11' style=';'><div id='questionWrap-11'  class='   watupro-question-id-422276'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>11. <\/span>Which of the following fields in an IPv4 header is used for packet fragmentation and reassembly?<\/div><input type='hidden' name='question_id[]' id='qID_11' value='422276' \/><input type='hidden' id='answerType422276' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422276[]' id='answer-id-1635206' class='answer   answerof-422276 ' value='1635206'   \/><label for='answer-id-1635206' id='answer-label-1635206' class=' answer'><span>Header Checksum<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422276[]' id='answer-id-1635207' class='answer   answerof-422276 ' value='1635207'   \/><label for='answer-id-1635207' id='answer-label-1635207' class=' answer'><span>Time to Live (TTL)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422276[]' id='answer-id-1635208' class='answer   answerof-422276 ' value='1635208'   \/><label for='answer-id-1635208' id='answer-label-1635208' class=' answer'><span>Identification<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422276[]' id='answer-id-1635209' class='answer   answerof-422276 ' value='1635209'   \/><label for='answer-id-1635209' id='answer-label-1635209' class=' answer'><span>Protocol<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-12' style=';'><div id='questionWrap-12'  class='   watupro-question-id-422277'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>12. <\/span>Why should verbose error messages be avoided in production web applications?<\/div><input type='hidden' name='question_id[]' id='qID_12' value='422277' \/><input type='hidden' id='answerType422277' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422277[]' id='answer-id-1635210' class='answer   answerof-422277 ' value='1635210'   \/><label for='answer-id-1635210' id='answer-label-1635210' class=' answer'><span>They decrease search engine rankings<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422277[]' id='answer-id-1635211' class='answer   answerof-422277 ' value='1635211'   \/><label for='answer-id-1635211' id='answer-label-1635211' class=' answer'><span>They expose internal details such as file paths, technologies, or SQL queries<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422277[]' id='answer-id-1635212' class='answer   answerof-422277 ' value='1635212'   \/><label for='answer-id-1635212' id='answer-label-1635212' class=' answer'><span>They confuse legitimate users<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422277[]' id='answer-id-1635213' class='answer   answerof-422277 ' value='1635213'   \/><label for='answer-id-1635213' id='answer-label-1635213' class=' answer'><span>They affect server bandwidth<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-13' style=';'><div id='questionWrap-13'  class='   watupro-question-id-422278'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>13. <\/span>What is the primary goal of performing a manual source code review during a web assessment?<\/div><input type='hidden' name='question_id[]' id='qID_13' value='422278' \/><input type='hidden' id='answerType422278' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422278[]' id='answer-id-1635214' class='answer   answerof-422278 ' value='1635214'   \/><label for='answer-id-1635214' id='answer-label-1635214' class=' answer'><span>To identify unlinked pages<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422278[]' id='answer-id-1635215' class='answer   answerof-422278 ' value='1635215'   \/><label for='answer-id-1635215' id='answer-label-1635215' class=' answer'><span>To find logic flaws and insecure coding practices<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422278[]' id='answer-id-1635216' class='answer   answerof-422278 ' value='1635216'   \/><label for='answer-id-1635216' id='answer-label-1635216' class=' answer'><span>To test performance of the application<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422278[]' id='answer-id-1635217' class='answer   answerof-422278 ' value='1635217'   \/><label for='answer-id-1635217' id='answer-label-1635217' class=' answer'><span>To bypass authentication without credentials<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-14' style=';'><div id='questionWrap-14'  class='   watupro-question-id-422279'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>14. <\/span>Which of the following tools is typically used to retrieve WHOIS data for domain registration information?<\/div><input type='hidden' name='question_id[]' id='qID_14' value='422279' \/><input type='hidden' id='answerType422279' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422279[]' id='answer-id-1635218' class='answer   answerof-422279 ' value='1635218'   \/><label for='answer-id-1635218' id='answer-label-1635218' class=' answer'><span>Nmap<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422279[]' id='answer-id-1635219' class='answer   answerof-422279 ' value='1635219'   \/><label for='answer-id-1635219' id='answer-label-1635219' class=' answer'><span>Whois<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422279[]' id='answer-id-1635220' class='answer   answerof-422279 ' value='1635220'   \/><label for='answer-id-1635220' id='answer-label-1635220' class=' answer'><span>Netcat<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422279[]' id='answer-id-1635221' class='answer   answerof-422279 ' value='1635221'   \/><label for='answer-id-1635221' id='answer-label-1635221' class=' answer'><span>Dig<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-15' style=';'><div id='questionWrap-15'  class='   watupro-question-id-422280'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>15. <\/span>Which of the following tools is most suitable for discovering hidden directories and files during web reconnaissance?<\/div><input type='hidden' name='question_id[]' id='qID_15' value='422280' \/><input type='hidden' id='answerType422280' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422280[]' id='answer-id-1635222' class='answer   answerof-422280 ' value='1635222'   \/><label for='answer-id-1635222' id='answer-label-1635222' class=' answer'><span>Dirb<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422280[]' id='answer-id-1635223' class='answer   answerof-422280 ' value='1635223'   \/><label for='answer-id-1635223' id='answer-label-1635223' class=' answer'><span>Netcat<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422280[]' id='answer-id-1635224' class='answer   answerof-422280 ' value='1635224'   \/><label for='answer-id-1635224' id='answer-label-1635224' class=' answer'><span>Telnet<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422280[]' id='answer-id-1635225' class='answer   answerof-422280 ' value='1635225'   \/><label for='answer-id-1635225' id='answer-label-1635225' class=' answer'><span>Nmap<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-16' style=';'><div id='questionWrap-16'  class='   watupro-question-id-422281'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>16. <\/span>Which protocol is commonly used for remote client access in Microsoft Exchange?<\/div><input type='hidden' name='question_id[]' id='qID_16' value='422281' \/><input type='hidden' id='answerType422281' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422281[]' id='answer-id-1635226' class='answer   answerof-422281 ' value='1635226'   \/><label for='answer-id-1635226' id='answer-label-1635226' class=' answer'><span>IMAP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422281[]' id='answer-id-1635227' class='answer   answerof-422281 ' value='1635227'   \/><label for='answer-id-1635227' id='answer-label-1635227' class=' answer'><span>RDP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422281[]' id='answer-id-1635228' class='answer   answerof-422281 ' value='1635228'   \/><label for='answer-id-1635228' id='answer-label-1635228' class=' answer'><span>MAPI over HTTP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422281[]' id='answer-id-1635229' class='answer   answerof-422281 ' value='1635229'   \/><label for='answer-id-1635229' id='answer-label-1635229' class=' answer'><span>FTP<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-17' style=';'><div id='questionWrap-17'  class='   watupro-question-id-422282'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>17. <\/span>What command-line tool is commonly used to test SMTP servers for open relay vulnerabilities?<\/div><input type='hidden' name='question_id[]' id='qID_17' value='422282' \/><input type='hidden' id='answerType422282' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422282[]' id='answer-id-1635230' class='answer   answerof-422282 ' value='1635230'   \/><label for='answer-id-1635230' id='answer-label-1635230' class=' answer'><span>Telnet<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422282[]' id='answer-id-1635231' class='answer   answerof-422282 ' value='1635231'   \/><label for='answer-id-1635231' id='answer-label-1635231' class=' answer'><span>Curl<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422282[]' id='answer-id-1635232' class='answer   answerof-422282 ' value='1635232'   \/><label for='answer-id-1635232' id='answer-label-1635232' class=' answer'><span>Dig<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422282[]' id='answer-id-1635233' class='answer   answerof-422282 ' value='1635233'   \/><label for='answer-id-1635233' id='answer-label-1635233' class=' answer'><span>Arp-scan<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-18' style=';'><div id='questionWrap-18'  class='   watupro-question-id-422283'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>18. <\/span>Which of the following is a popular open-source web application server used to deploy Java-based applications?<\/div><input type='hidden' name='question_id[]' id='qID_18' value='422283' \/><input type='hidden' id='answerType422283' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422283[]' id='answer-id-1635234' class='answer   answerof-422283 ' value='1635234'   \/><label for='answer-id-1635234' id='answer-label-1635234' class=' answer'><span>Apache HTTP Server<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422283[]' id='answer-id-1635235' class='answer   answerof-422283 ' value='1635235'   \/><label for='answer-id-1635235' id='answer-label-1635235' class=' answer'><span>Tomcat<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422283[]' id='answer-id-1635236' class='answer   answerof-422283 ' value='1635236'   \/><label for='answer-id-1635236' id='answer-label-1635236' class=' answer'><span>IIS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422283[]' id='answer-id-1635237' class='answer   answerof-422283 ' value='1635237'   \/><label for='answer-id-1635237' id='answer-label-1635237' class=' answer'><span>Nginx<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-19' style=';'><div id='questionWrap-19'  class='   watupro-question-id-422284'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>19. <\/span>Which port does traditional FTP use for control communication?<\/div><input type='hidden' name='question_id[]' id='qID_19' value='422284' \/><input type='hidden' id='answerType422284' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422284[]' id='answer-id-1635238' class='answer   answerof-422284 ' value='1635238'   \/><label for='answer-id-1635238' id='answer-label-1635238' class=' answer'><span>20<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422284[]' id='answer-id-1635239' class='answer   answerof-422284 ' value='1635239'   \/><label for='answer-id-1635239' id='answer-label-1635239' class=' answer'><span>21<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422284[]' id='answer-id-1635240' class='answer   answerof-422284 ' value='1635240'   \/><label for='answer-id-1635240' id='answer-label-1635240' class=' answer'><span>22<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422284[]' id='answer-id-1635241' class='answer   answerof-422284 ' value='1635241'   \/><label for='answer-id-1635241' id='answer-label-1635241' class=' answer'><span>23<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-20' style=';'><div id='questionWrap-20'  class='   watupro-question-id-422285'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>20. <\/span>Why is VoIP considered a high-value target during penetration tests?<\/div><input type='hidden' name='question_id[]' id='qID_20' value='422285' \/><input type='hidden' id='answerType422285' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422285[]' id='answer-id-1635242' class='answer   answerof-422285 ' value='1635242'   \/><label for='answer-id-1635242' id='answer-label-1635242' class=' answer'><span>It is always unencrypted<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422285[]' id='answer-id-1635243' class='answer   answerof-422285 ' value='1635243'   \/><label for='answer-id-1635243' id='answer-label-1635243' class=' answer'><span>It operates only over TCP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422285[]' id='answer-id-1635244' class='answer   answerof-422285 ' value='1635244'   \/><label for='answer-id-1635244' id='answer-label-1635244' class=' answer'><span>It often contains sensitive voice data and user credentials<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422285[]' id='answer-id-1635245' class='answer   answerof-422285 ' value='1635245'   \/><label for='answer-id-1635245' id='answer-label-1635245' class=' answer'><span>It uses proprietary, untestable protocols<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-21' style=';'><div id='questionWrap-21'  class='   watupro-question-id-422286'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>21. <\/span>Which type of DNS record is used to define the mail server for a domain?<\/div><input type='hidden' name='question_id[]' id='qID_21' value='422286' \/><input type='hidden' id='answerType422286' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422286[]' id='answer-id-1635246' class='answer   answerof-422286 ' value='1635246'   \/><label for='answer-id-1635246' id='answer-label-1635246' class=' answer'><span>A record<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422286[]' id='answer-id-1635247' class='answer   answerof-422286 ' value='1635247'   \/><label for='answer-id-1635247' id='answer-label-1635247' class=' answer'><span>TXT record<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422286[]' id='answer-id-1635248' class='answer   answerof-422286 ' value='1635248'   \/><label for='answer-id-1635248' id='answer-label-1635248' class=' answer'><span>MX record<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422286[]' id='answer-id-1635249' class='answer   answerof-422286 ' value='1635249'   \/><label for='answer-id-1635249' id='answer-label-1635249' class=' answer'><span>CNAME record<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-22' style=';'><div id='questionWrap-22'  class='   watupro-question-id-422287'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>22. <\/span>What information is commonly exposed in email headers that may aid an attacker?<\/div><input type='hidden' name='question_id[]' id='qID_22' value='422287' \/><input type='hidden' id='answerType422287' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422287[]' id='answer-id-1635250' class='answer   answerof-422287 ' value='1635250'   \/><label for='answer-id-1635250' id='answer-label-1635250' class=' answer'><span>Password hashes<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422287[]' id='answer-id-1635251' class='answer   answerof-422287 ' value='1635251'   \/><label for='answer-id-1635251' id='answer-label-1635251' class=' answer'><span>Operating system serial number<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422287[]' id='answer-id-1635252' class='answer   answerof-422287 ' value='1635252'   \/><label for='answer-id-1635252' id='answer-label-1635252' class=' answer'><span>SSL private keys<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422287[]' id='answer-id-1635253' class='answer   answerof-422287 ' value='1635253'   \/><label for='answer-id-1635253' id='answer-label-1635253' class=' answer'><span>Internal hostnames and IP addresses<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-23' style=';'><div id='questionWrap-23'  class='   watupro-question-id-422288'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>23. <\/span>What valuable information can often be gained by analyzing publicly accessible robots.txt files on a target website?<\/div><input type='hidden' name='question_id[]' id='qID_23' value='422288' \/><input type='hidden' id='answerType422288' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422288[]' id='answer-id-1635254' class='answer   answerof-422288 ' value='1635254'   \/><label for='answer-id-1635254' id='answer-label-1635254' class=' answer'><span>Web application firewall rules<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422288[]' id='answer-id-1635255' class='answer   answerof-422288 ' value='1635255'   \/><label for='answer-id-1635255' id='answer-label-1635255' class=' answer'><span>Directory paths intended to be hidden from search engines<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422288[]' id='answer-id-1635256' class='answer   answerof-422288 ' value='1635256'   \/><label for='answer-id-1635256' id='answer-label-1635256' class=' answer'><span>JavaScript obfuscation methods<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422288[]' id='answer-id-1635257' class='answer   answerof-422288 ' value='1635257'   \/><label for='answer-id-1635257' id='answer-label-1635257' class=' answer'><span>SSL certificate expiration date<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-24' style=';'><div id='questionWrap-24'  class='   watupro-question-id-422289'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>24. <\/span>Which of the following best describes the purpose of the HTML &lt;form&gt; tag?<\/div><input type='hidden' name='question_id[]' id='qID_24' value='422289' \/><input type='hidden' id='answerType422289' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422289[]' id='answer-id-1635258' class='answer   answerof-422289 ' value='1635258'   \/><label for='answer-id-1635258' id='answer-label-1635258' class=' answer'><span>It adds styles to a webpage<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422289[]' id='answer-id-1635259' class='answer   answerof-422289 ' value='1635259'   \/><label for='answer-id-1635259' id='answer-label-1635259' class=' answer'><span>It defines input fields for user interaction and data submission<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422289[]' id='answer-id-1635260' class='answer   answerof-422289 ' value='1635260'   \/><label for='answer-id-1635260' id='answer-label-1635260' class=' answer'><span>It embeds JavaScript<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422289[]' id='answer-id-1635261' class='answer   answerof-422289 ' value='1635261'   \/><label for='answer-id-1635261' id='answer-label-1635261' class=' answer'><span>It renders images on the server<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-25' style=';'><div id='questionWrap-25'  class='   watupro-question-id-422290'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>25. <\/span>Which UK legislation specifically makes unauthorized access to computer systems a criminal offence?<\/div><input type='hidden' name='question_id[]' id='qID_25' value='422290' \/><input type='hidden' id='answerType422290' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422290[]' id='answer-id-1635262' class='answer   answerof-422290 ' value='1635262'   \/><label for='answer-id-1635262' id='answer-label-1635262' class=' answer'><span>Data Protection Act 2018<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422290[]' id='answer-id-1635263' class='answer   answerof-422290 ' value='1635263'   \/><label for='answer-id-1635263' id='answer-label-1635263' class=' answer'><span>Computer Misuse Act 1990<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422290[]' id='answer-id-1635264' class='answer   answerof-422290 ' value='1635264'   \/><label for='answer-id-1635264' id='answer-label-1635264' class=' answer'><span>Regulation of Investigatory Powers Act 2000<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422290[]' id='answer-id-1635265' class='answer   answerof-422290 ' value='1635265'   \/><label for='answer-id-1635265' id='answer-label-1635265' class=' answer'><span>Freedom of Information Act 2000<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-26' style=';'><div id='questionWrap-26'  class='   watupro-question-id-422291'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>26. <\/span>Which tool is commonly used for capturing and analyzing network traffic in real time?<\/div><input type='hidden' name='question_id[]' id='qID_26' value='422291' \/><input type='hidden' id='answerType422291' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422291[]' id='answer-id-1635266' class='answer   answerof-422291 ' value='1635266'   \/><label for='answer-id-1635266' id='answer-label-1635266' class=' answer'><span>Nikto<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422291[]' id='answer-id-1635267' class='answer   answerof-422291 ' value='1635267'   \/><label for='answer-id-1635267' id='answer-label-1635267' class=' answer'><span>Wireshark<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422291[]' id='answer-id-1635268' class='answer   answerof-422291 ' value='1635268'   \/><label for='answer-id-1635268' id='answer-label-1635268' class=' answer'><span>Nmap<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422291[]' id='answer-id-1635269' class='answer   answerof-422291 ' value='1635269'   \/><label for='answer-id-1635269' id='answer-label-1635269' class=' answer'><span>Metasploit<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-27' style=';'><div id='questionWrap-27'  class='   watupro-question-id-422292'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>27. <\/span>Which technique is best used to evaluate an unknown service running on a non-standard port?<\/div><input type='hidden' name='question_id[]' id='qID_27' value='422292' \/><input type='hidden' id='answerType422292' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422292[]' id='answer-id-1635270' class='answer   answerof-422292 ' value='1635270'   \/><label for='answer-id-1635270' id='answer-label-1635270' class=' answer'><span>TCP SYN scan<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422292[]' id='answer-id-1635271' class='answer   answerof-422292 ' value='1635271'   \/><label for='answer-id-1635271' id='answer-label-1635271' class=' answer'><span>Banner grabbing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422292[]' id='answer-id-1635272' class='answer   answerof-422292 ' value='1635272'   \/><label for='answer-id-1635272' id='answer-label-1635272' class=' answer'><span>DNS zone transfer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422292[]' id='answer-id-1635273' class='answer   answerof-422292 ' value='1635273'   \/><label for='answer-id-1635273' id='answer-label-1635273' class=' answer'><span>ARP spoofing<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-28' style=';'><div id='questionWrap-28'  class='   watupro-question-id-422293'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>28. <\/span>What HTTP response header can help mitigate XSS by instructing the browser not to execute scripts from unauthorized origins?<\/div><input type='hidden' name='question_id[]' id='qID_28' value='422293' \/><input type='hidden' id='answerType422293' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422293[]' id='answer-id-1635274' class='answer   answerof-422293 ' value='1635274'   \/><label for='answer-id-1635274' id='answer-label-1635274' class=' answer'><span>Content-Type<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422293[]' id='answer-id-1635275' class='answer   answerof-422293 ' value='1635275'   \/><label for='answer-id-1635275' id='answer-label-1635275' class=' answer'><span>X-XSS-Protection<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422293[]' id='answer-id-1635276' class='answer   answerof-422293 ' value='1635276'   \/><label for='answer-id-1635276' id='answer-label-1635276' class=' answer'><span>Content-Security-Policy (CSP)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422293[]' id='answer-id-1635277' class='answer   answerof-422293 ' value='1635277'   \/><label for='answer-id-1635277' id='answer-label-1635277' class=' answer'><span>Referrer-Policy<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-29' style=';'><div id='questionWrap-29'  class='   watupro-question-id-422294'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>29. <\/span>Which programming language is executed directly in the user\u2019s browser?<\/div><input type='hidden' name='question_id[]' id='qID_29' value='422294' \/><input type='hidden' id='answerType422294' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422294[]' id='answer-id-1635278' class='answer   answerof-422294 ' value='1635278'   \/><label for='answer-id-1635278' id='answer-label-1635278' class=' answer'><span>Perl<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422294[]' id='answer-id-1635279' class='answer   answerof-422294 ' value='1635279'   \/><label for='answer-id-1635279' id='answer-label-1635279' class=' answer'><span>PHP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422294[]' id='answer-id-1635280' class='answer   answerof-422294 ' value='1635280'   \/><label for='answer-id-1635280' id='answer-label-1635280' class=' answer'><span>JavaScript<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422294[]' id='answer-id-1635281' class='answer   answerof-422294 ' value='1635281'   \/><label for='answer-id-1635281' id='answer-label-1635281' class=' answer'><span>Java (JSP)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-30' style=';'><div id='questionWrap-30'  class='   watupro-question-id-422295'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>30. <\/span>Which framework is commonly used in web application threat modelling to categorize potential attacker goals?<\/div><input type='hidden' name='question_id[]' id='qID_30' value='422295' \/><input type='hidden' id='answerType422295' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422295[]' id='answer-id-1635282' class='answer   answerof-422295 ' value='1635282'   \/><label for='answer-id-1635282' id='answer-label-1635282' class=' answer'><span>STRIDE<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422295[]' id='answer-id-1635283' class='answer   answerof-422295 ' value='1635283'   \/><label for='answer-id-1635283' id='answer-label-1635283' class=' answer'><span>OSINT<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422295[]' id='answer-id-1635284' class='answer   answerof-422295 ' value='1635284'   \/><label for='answer-id-1635284' id='answer-label-1635284' class=' answer'><span>XSSER<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422295[]' id='answer-id-1635285' class='answer   answerof-422295 ' value='1635285'   \/><label for='answer-id-1635285' id='answer-label-1635285' class=' answer'><span>OWASP ZAP<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-31' style=';'><div id='questionWrap-31'  class='   watupro-question-id-422296'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>31. <\/span>During traffic analysis, which layer of the OSI model would reveal source and destination MAC addresses?<\/div><input type='hidden' name='question_id[]' id='qID_31' value='422296' \/><input type='hidden' id='answerType422296' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422296[]' id='answer-id-1635286' class='answer   answerof-422296 ' value='1635286'   \/><label for='answer-id-1635286' id='answer-label-1635286' class=' answer'><span>Layer 3 C Network<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422296[]' id='answer-id-1635287' class='answer   answerof-422296 ' value='1635287'   \/><label for='answer-id-1635287' id='answer-label-1635287' class=' answer'><span>Layer 5 C Session<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422296[]' id='answer-id-1635288' class='answer   answerof-422296 ' value='1635288'   \/><label for='answer-id-1635288' id='answer-label-1635288' class=' answer'><span>Layer 2 C Data Link<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422296[]' id='answer-id-1635289' class='answer   answerof-422296 ' value='1635289'   \/><label for='answer-id-1635289' id='answer-label-1635289' class=' answer'><span>Layer 7 C Application<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-32' style=';'><div id='questionWrap-32'  class='   watupro-question-id-422297'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>32. <\/span>Which of the following configuration issues presents the highest risk on a network device?<\/div><input type='hidden' name='question_id[]' id='qID_32' value='422297' \/><input type='hidden' id='answerType422297' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422297[]' id='answer-id-1635290' class='answer   answerof-422297 ' value='1635290'   \/><label for='answer-id-1635290' id='answer-label-1635290' class=' answer'><span>Hostname not matching internal naming policy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422297[]' id='answer-id-1635291' class='answer   answerof-422297 ' value='1635291'   \/><label for='answer-id-1635291' id='answer-label-1635291' class=' answer'><span>Outdated banners<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422297[]' id='answer-id-1635292' class='answer   answerof-422297 ' value='1635292'   \/><label for='answer-id-1635292' id='answer-label-1635292' class=' answer'><span>Default administrative credentials<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422297[]' id='answer-id-1635293' class='answer   answerof-422297 ' value='1635293'   \/><label for='answer-id-1635293' id='answer-label-1635293' class=' answer'><span>Lack of NTP synchronization<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-33' style=';'><div id='questionWrap-33'  class='   watupro-question-id-422298'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>33. <\/span>1.Which term best describes the likelihood that a threat will exploit a vulnerability causing harm?<\/div><input type='hidden' name='question_id[]' id='qID_33' value='422298' \/><input type='hidden' id='answerType422298' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422298[]' id='answer-id-1635294' class='answer   answerof-422298 ' value='1635294'   \/><label for='answer-id-1635294' id='answer-label-1635294' class=' answer'><span>Risk<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422298[]' id='answer-id-1635295' class='answer   answerof-422298 ' value='1635295'   \/><label for='answer-id-1635295' id='answer-label-1635295' class=' answer'><span>Threat<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422298[]' id='answer-id-1635296' class='answer   answerof-422298 ' value='1635296'   \/><label for='answer-id-1635296' id='answer-label-1635296' class=' answer'><span>Exposure<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422298[]' id='answer-id-1635297' class='answer   answerof-422298 ' value='1635297'   \/><label for='answer-id-1635297' id='answer-label-1635297' class=' answer'><span>Control<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-34' style=';'><div id='questionWrap-34'  class='   watupro-question-id-422299'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>34. <\/span>On a Linux system, which of the following permission settings allows a file to be executed only by the owner?<\/div><input type='hidden' name='question_id[]' id='qID_34' value='422299' \/><input type='hidden' id='answerType422299' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422299[]' id='answer-id-1635298' class='answer   answerof-422299 ' value='1635298'   \/><label for='answer-id-1635298' id='answer-label-1635298' class=' answer'><span>744<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422299[]' id='answer-id-1635299' class='answer   answerof-422299 ' value='1635299'   \/><label for='answer-id-1635299' id='answer-label-1635299' class=' answer'><span>755<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422299[]' id='answer-id-1635300' class='answer   answerof-422299 ' value='1635300'   \/><label for='answer-id-1635300' id='answer-label-1635300' class=' answer'><span>711<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422299[]' id='answer-id-1635301' class='answer   answerof-422299 ' value='1635301'   \/><label for='answer-id-1635301' id='answer-label-1635301' class=' answer'><span>700<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-35' style=';'><div id='questionWrap-35'  class='   watupro-question-id-422300'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>35. <\/span>Which HTTP header would you modify to help perform an &quot;HTTP request smuggling&quot; attack?<\/div><input type='hidden' name='question_id[]' id='qID_35' value='422300' \/><input type='hidden' id='answerType422300' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422300[]' id='answer-id-1635302' class='answer   answerof-422300 ' value='1635302'   \/><label for='answer-id-1635302' id='answer-label-1635302' class=' answer'><span>Expires<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422300[]' id='answer-id-1635303' class='answer   answerof-422300 ' value='1635303'   \/><label for='answer-id-1635303' id='answer-label-1635303' class=' answer'><span>Pragma<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422300[]' id='answer-id-1635304' class='answer   answerof-422300 ' value='1635304'   \/><label for='answer-id-1635304' id='answer-label-1635304' class=' answer'><span>Cache-Control<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422300[]' id='answer-id-1635305' class='answer   answerof-422300 ' value='1635305'   \/><label for='answer-id-1635305' id='answer-label-1635305' class=' answer'><span>Content-Length<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422300[]' id='answer-id-1635306' class='answer   answerof-422300 ' value='1635306'   \/><label for='answer-id-1635306' id='answer-label-1635306' class=' answer'><span>Content-Language<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-36' style=';'><div id='questionWrap-36'  class='   watupro-question-id-422301'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>36. <\/span>What is the primary goal of application fingerprinting during a security assessment?<\/div><input type='hidden' name='question_id[]' id='qID_36' value='422301' \/><input type='hidden' id='answerType422301' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422301[]' id='answer-id-1635307' class='answer   answerof-422301 ' value='1635307'   \/><label for='answer-id-1635307' id='answer-label-1635307' class=' answer'><span>To launch a brute force attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422301[]' id='answer-id-1635308' class='answer   answerof-422301 ' value='1635308'   \/><label for='answer-id-1635308' id='answer-label-1635308' class=' answer'><span>To identify open ports<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422301[]' id='answer-id-1635309' class='answer   answerof-422301 ' value='1635309'   \/><label for='answer-id-1635309' id='answer-label-1635309' class=' answer'><span>To determine application type and version<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422301[]' id='answer-id-1635310' class='answer   answerof-422301 ' value='1635310'   \/><label for='answer-id-1635310' id='answer-label-1635310' class=' answer'><span>To evade firewalls<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-37' style=';'><div id='questionWrap-37'  class='   watupro-question-id-422302'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>37. <\/span>Which of the following conditions makes an FTP server highly vulnerable to abuse?<\/div><input type='hidden' name='question_id[]' id='qID_37' value='422302' \/><input type='hidden' id='answerType422302' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422302[]' id='answer-id-1635311' class='answer   answerof-422302 ' value='1635311'   \/><label for='answer-id-1635311' id='answer-label-1635311' class=' answer'><span>Passive mode disabled<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422302[]' id='answer-id-1635312' class='answer   answerof-422302 ' value='1635312'   \/><label for='answer-id-1635312' id='answer-label-1635312' class=' answer'><span>Anonymous access enabled with write permissions<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422302[]' id='answer-id-1635313' class='answer   answerof-422302 ' value='1635313'   \/><label for='answer-id-1635313' id='answer-label-1635313' class=' answer'><span>SFTP enabled instead of FTP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422302[]' id='answer-id-1635314' class='answer   answerof-422302 ' value='1635314'   \/><label for='answer-id-1635314' id='answer-label-1635314' class=' answer'><span>File listing disabled<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-38' style=';'><div id='questionWrap-38'  class='   watupro-question-id-422303'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>38. <\/span>Why is directory listing considered a security risk on web servers?<\/div><input type='hidden' name='question_id[]' id='qID_38' value='422303' \/><input type='hidden' id='answerType422303' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422303[]' id='answer-id-1635315' class='answer   answerof-422303 ' value='1635315'   \/><label for='answer-id-1635315' id='answer-label-1635315' class=' answer'><span>It slows down the server response time<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422303[]' id='answer-id-1635316' class='answer   answerof-422303 ' value='1635316'   \/><label for='answer-id-1635316' id='answer-label-1635316' class=' answer'><span>It reveals server IP addresses<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422303[]' id='answer-id-1635317' class='answer   answerof-422303 ' value='1635317'   \/><label for='answer-id-1635317' id='answer-label-1635317' class=' answer'><span>It encrypts traffic incorrectly<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422303[]' id='answer-id-1635318' class='answer   answerof-422303 ' value='1635318'   \/><label for='answer-id-1635318' id='answer-label-1635318' class=' answer'><span>It exposes sensitive files to unauthenticated users<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-39' style=';'><div id='questionWrap-39'  class='   watupro-question-id-422304'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>39. <\/span>Which Nmap option performs aggressive OS detection?<\/div><input type='hidden' name='question_id[]' id='qID_39' value='422304' \/><input type='hidden' id='answerType422304' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422304[]' id='answer-id-1635319' class='answer   answerof-422304 ' value='1635319'   \/><label for='answer-id-1635319' id='answer-label-1635319' class=' answer'><span>-sT<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422304[]' id='answer-id-1635320' class='answer   answerof-422304 ' value='1635320'   \/><label for='answer-id-1635320' id='answer-label-1635320' class=' answer'><span>-A<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422304[]' id='answer-id-1635321' class='answer   answerof-422304 ' value='1635321'   \/><label for='answer-id-1635321' id='answer-label-1635321' class=' answer'><span>-O<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422304[]' id='answer-id-1635322' class='answer   answerof-422304 ' value='1635322'   \/><label for='answer-id-1635322' id='answer-label-1635322' class=' answer'><span>-sV<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-40' style=';'><div id='questionWrap-40'  class='   watupro-question-id-422305'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>40. <\/span>Which transport layer protocol provides reliable data transfer with flow control and sequencing?<\/div><input type='hidden' name='question_id[]' id='qID_40' value='422305' \/><input type='hidden' id='answerType422305' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422305[]' id='answer-id-1635323' class='answer   answerof-422305 ' value='1635323'   \/><label for='answer-id-1635323' id='answer-label-1635323' class=' answer'><span>UDP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422305[]' id='answer-id-1635324' class='answer   answerof-422305 ' value='1635324'   \/><label for='answer-id-1635324' id='answer-label-1635324' class=' answer'><span>ICMP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422305[]' id='answer-id-1635325' class='answer   answerof-422305 ' value='1635325'   \/><label for='answer-id-1635325' id='answer-label-1635325' class=' answer'><span>TCP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422305[]' id='answer-id-1635326' class='answer   answerof-422305 ' value='1635326'   \/><label for='answer-id-1635326' id='answer-label-1635326' class=' answer'><span>ARP<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-41' style=';'><div id='questionWrap-41'  class='   watupro-question-id-422306'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>41. <\/span>Which Oracle privilege, if granted improperly, can allow a user to execute functions as another user, potentially leading to privilege escalation?<\/div><input type='hidden' name='question_id[]' id='qID_41' value='422306' \/><input type='hidden' id='answerType422306' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422306[]' id='answer-id-1635327' class='answer   answerof-422306 ' value='1635327'   \/><label for='answer-id-1635327' id='answer-label-1635327' class=' answer'><span>GRANT CREATE SESSION<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422306[]' id='answer-id-1635328' class='answer   answerof-422306 ' value='1635328'   \/><label for='answer-id-1635328' id='answer-label-1635328' class=' answer'><span>GRANT EXECUTE ANY PROCEDURE<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422306[]' id='answer-id-1635329' class='answer   answerof-422306 ' value='1635329'   \/><label for='answer-id-1635329' id='answer-label-1635329' class=' answer'><span>GRANT SELECT ON DBA_USERS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422306[]' id='answer-id-1635330' class='answer   answerof-422306 ' value='1635330'   \/><label for='answer-id-1635330' id='answer-label-1635330' class=' answer'><span>GRANT DROP ANY TABLE<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-42' style=';'><div id='questionWrap-42'  class='   watupro-question-id-422307'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>42. <\/span>Which cryptographic concept ensures that a message has not been altered in transit?<\/div><input type='hidden' name='question_id[]' id='qID_42' value='422307' \/><input type='hidden' id='answerType422307' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422307[]' id='answer-id-1635331' class='answer   answerof-422307 ' value='1635331'   \/><label for='answer-id-1635331' id='answer-label-1635331' class=' answer'><span>Confidentiality<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422307[]' id='answer-id-1635332' class='answer   answerof-422307 ' value='1635332'   \/><label for='answer-id-1635332' id='answer-label-1635332' class=' answer'><span>Availability<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422307[]' id='answer-id-1635333' class='answer   answerof-422307 ' value='1635333'   \/><label for='answer-id-1635333' id='answer-label-1635333' class=' answer'><span>Integrity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422307[]' id='answer-id-1635334' class='answer   answerof-422307 ' value='1635334'   \/><label for='answer-id-1635334' id='answer-label-1635334' class=' answer'><span>Non-repudiation<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-43' style=';'><div id='questionWrap-43'  class='   watupro-question-id-422308'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>43. <\/span>Which of the following is a key sign that a SQL injection vulnerability is present?<\/div><input type='hidden' name='question_id[]' id='qID_43' value='422308' \/><input type='hidden' id='answerType422308' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422308[]' id='answer-id-1635335' class='answer   answerof-422308 ' value='1635335'   \/><label for='answer-id-1635335' id='answer-label-1635335' class=' answer'><span>A 404 error page is returned<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422308[]' id='answer-id-1635336' class='answer   answerof-422308 ' value='1635336'   \/><label for='answer-id-1635336' id='answer-label-1635336' class=' answer'><span>The page redirects to the home page<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422308[]' id='answer-id-1635337' class='answer   answerof-422308 ' value='1635337'   \/><label for='answer-id-1635337' id='answer-label-1635337' class=' answer'><span>SQL syntax or database error messages are displayed<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422308[]' id='answer-id-1635338' class='answer   answerof-422308 ' value='1635338'   \/><label for='answer-id-1635338' id='answer-label-1635338' class=' answer'><span>CAPTCHA is triggered<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-44' style=';'><div id='questionWrap-44'  class='   watupro-question-id-422309'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>44. <\/span>Why is exposing the application server\u2019s administrative console to the public internet a security risk?<\/div><input type='hidden' name='question_id[]' id='qID_44' value='422309' \/><input type='hidden' id='answerType422309' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422309[]' id='answer-id-1635339' class='answer   answerof-422309 ' value='1635339'   \/><label for='answer-id-1635339' id='answer-label-1635339' class=' answer'><span>It improves performance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422309[]' id='answer-id-1635340' class='answer   answerof-422309 ' value='1635340'   \/><label for='answer-id-1635340' id='answer-label-1635340' class=' answer'><span>It bypasses SSL validation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422309[]' id='answer-id-1635341' class='answer   answerof-422309 ' value='1635341'   \/><label for='answer-id-1635341' id='answer-label-1635341' class=' answer'><span>It allows attackers to perform configuration changes or deployments<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422309[]' id='answer-id-1635342' class='answer   answerof-422309 ' value='1635342'   \/><label for='answer-id-1635342' id='answer-label-1635342' class=' answer'><span>It disables session timeouts<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-45' style=';'><div id='questionWrap-45'  class='   watupro-question-id-422310'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>45. <\/span>Which of the following helps automate patch deployment in enterprise environments?<\/div><input type='hidden' name='question_id[]' id='qID_45' value='422310' \/><input type='hidden' id='answerType422310' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422310[]' id='answer-id-1635343' class='answer   answerof-422310 ' value='1635343'   \/><label for='answer-id-1635343' id='answer-label-1635343' class=' answer'><span>Group Policy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422310[]' id='answer-id-1635344' class='answer   answerof-422310 ' value='1635344'   \/><label for='answer-id-1635344' id='answer-label-1635344' class=' answer'><span>WSUS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422310[]' id='answer-id-1635345' class='answer   answerof-422310 ' value='1635345'   \/><label for='answer-id-1635345' id='answer-label-1635345' class=' answer'><span>Event Viewer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422310[]' id='answer-id-1635346' class='answer   answerof-422310 ' value='1635346'   \/><label for='answer-id-1635346' id='answer-label-1635346' class=' answer'><span>Task Manager<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-46' style=';'><div id='questionWrap-46'  class='   watupro-question-id-422311'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>46. <\/span>When conducting a penetration test on personal data, which regulation must be taken into consideration?<\/div><input type='hidden' name='question_id[]' id='qID_46' value='422311' \/><input type='hidden' id='answerType422311' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422311[]' id='answer-id-1635347' class='answer   answerof-422311 ' value='1635347'   \/><label for='answer-id-1635347' id='answer-label-1635347' class=' answer'><span>Computer Misuse Act 1990<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422311[]' id='answer-id-1635348' class='answer   answerof-422311 ' value='1635348'   \/><label for='answer-id-1635348' id='answer-label-1635348' class=' answer'><span>GDPR (General Data Protection Regulation)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422311[]' id='answer-id-1635349' class='answer   answerof-422311 ' value='1635349'   \/><label for='answer-id-1635349' id='answer-label-1635349' class=' answer'><span>Freedom of Information Act<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422311[]' id='answer-id-1635350' class='answer   answerof-422311 ' value='1635350'   \/><label for='answer-id-1635350' id='answer-label-1635350' class=' answer'><span>PCI-DSS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-47' style=';'><div id='questionWrap-47'  class='   watupro-question-id-422312'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>47. <\/span>What is a potential security risk of embedding unvalidated user input inside HTML pages?<\/div><input type='hidden' name='question_id[]' id='qID_47' value='422312' \/><input type='hidden' id='answerType422312' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422312[]' id='answer-id-1635351' class='answer   answerof-422312 ' value='1635351'   \/><label for='answer-id-1635351' id='answer-label-1635351' class=' answer'><span>HTTP header injection<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422312[]' id='answer-id-1635352' class='answer   answerof-422312 ' value='1635352'   \/><label for='answer-id-1635352' id='answer-label-1635352' class=' answer'><span>SQL Injection<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422312[]' id='answer-id-1635353' class='answer   answerof-422312 ' value='1635353'   \/><label for='answer-id-1635353' id='answer-label-1635353' class=' answer'><span>Cross-site scripting (XSS)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422312[]' id='answer-id-1635354' class='answer   answerof-422312 ' value='1635354'   \/><label for='answer-id-1635354' id='answer-label-1635354' class=' answer'><span>DNS Rebinding<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-48' style=';'><div id='questionWrap-48'  class='   watupro-question-id-422313'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>48. <\/span>Which DNS enumeration technique retrieves the entire DNS zone file from a DNS server?<\/div><input type='hidden' name='question_id[]' id='qID_48' value='422313' \/><input type='hidden' id='answerType422313' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422313[]' id='answer-id-1635355' class='answer   answerof-422313 ' value='1635355'   \/><label for='answer-id-1635355' id='answer-label-1635355' class=' answer'><span>DNS spoofing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422313[]' id='answer-id-1635356' class='answer   answerof-422313 ' value='1635356'   \/><label for='answer-id-1635356' id='answer-label-1635356' class=' answer'><span>DNS brute force<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422313[]' id='answer-id-1635357' class='answer   answerof-422313 ' value='1635357'   \/><label for='answer-id-1635357' id='answer-label-1635357' class=' answer'><span>DNS zone transfer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422313[]' id='answer-id-1635358' class='answer   answerof-422313 ' value='1635358'   \/><label for='answer-id-1635358' id='answer-label-1635358' class=' answer'><span>Reverse DNS lookup<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-49' style=';'><div id='questionWrap-49'  class='   watupro-question-id-422314'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>49. <\/span>Which method is most effective for verifying security configuration compliance on network devices?<\/div><input type='hidden' name='question_id[]' id='qID_49' value='422314' \/><input type='hidden' id='answerType422314' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422314[]' id='answer-id-1635359' class='answer   answerof-422314 ' value='1635359'   \/><label for='answer-id-1635359' id='answer-label-1635359' class=' answer'><span>Reviewing configuration files or running automated configuration audit tools<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422314[]' id='answer-id-1635360' class='answer   answerof-422314 ' value='1635360'   \/><label for='answer-id-1635360' id='answer-label-1635360' class=' answer'><span>Checking routing tables<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422314[]' id='answer-id-1635361' class='answer   answerof-422314 ' value='1635361'   \/><label for='answer-id-1635361' id='answer-label-1635361' class=' answer'><span>Port scanning with Nmap<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422314[]' id='answer-id-1635362' class='answer   answerof-422314 ' value='1635362'   \/><label for='answer-id-1635362' id='answer-label-1635362' class=' answer'><span>Performing denial-of-service attacks<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-50' style=';'><div id='questionWrap-50'  class='   watupro-question-id-422315'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>50. <\/span>You review an Nmap scan output and observe port 80\/tcp is open with a service name &quot;http-proxy.&quot; What does this imply?<\/div><input type='hidden' name='question_id[]' id='qID_50' value='422315' \/><input type='hidden' id='answerType422315' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422315[]' id='answer-id-1635363' class='answer   answerof-422315 ' value='1635363'   \/><label for='answer-id-1635363' id='answer-label-1635363' class=' answer'><span>The web server is using port forwarding<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422315[]' id='answer-id-1635364' class='answer   answerof-422315 ' value='1635364'   \/><label for='answer-id-1635364' id='answer-label-1635364' class=' answer'><span>The port is misconfigured and should be closed<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422315[]' id='answer-id-1635365' class='answer   answerof-422315 ' value='1635365'   \/><label for='answer-id-1635365' id='answer-label-1635365' class=' answer'><span>A proxy service (such as Squid) is running on that port<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422315[]' id='answer-id-1635366' class='answer   answerof-422315 ' value='1635366'   \/><label for='answer-id-1635366' id='answer-label-1635366' class=' answer'><span>SSL encryption is enforced on that port<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-51' style=';'><div id='questionWrap-51'  class='   watupro-question-id-422316'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>51. <\/span>Which of the following best describes perfect forward secrecy (PFS) in TLS?<\/div><input type='hidden' name='question_id[]' id='qID_51' value='422316' \/><input type='hidden' id='answerType422316' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422316[]' id='answer-id-1635367' class='answer   answerof-422316 ' value='1635367'   \/><label for='answer-id-1635367' id='answer-label-1635367' class=' answer'><span>Encrypts data using client\u2019s SSL certificate<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422316[]' id='answer-id-1635368' class='answer   answerof-422316 ' value='1635368'   \/><label for='answer-id-1635368' id='answer-label-1635368' class=' answer'><span>Ensures session keys are not derived from long-term keys<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422316[]' id='answer-id-1635369' class='answer   answerof-422316 ' value='1635369'   \/><label for='answer-id-1635369' id='answer-label-1635369' class=' answer'><span>Uses RSA for session key exchange<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422316[]' id='answer-id-1635370' class='answer   answerof-422316 ' value='1635370'   \/><label for='answer-id-1635370' id='answer-label-1635370' class=' answer'><span>Prevents man-in-the-middle attacks entirely<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-52' style=';'><div id='questionWrap-52'  class='   watupro-question-id-422317'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>52. <\/span>Which protocol is used to securely transmit HTTP traffic over an encrypted channel?<\/div><input type='hidden' name='question_id[]' id='qID_52' value='422317' \/><input type='hidden' id='answerType422317' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422317[]' id='answer-id-1635371' class='answer   answerof-422317 ' value='1635371'   \/><label for='answer-id-1635371' id='answer-label-1635371' class=' answer'><span>FTP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422317[]' id='answer-id-1635372' class='answer   answerof-422317 ' value='1635372'   \/><label for='answer-id-1635372' id='answer-label-1635372' class=' answer'><span>SSH<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422317[]' id='answer-id-1635373' class='answer   answerof-422317 ' value='1635373'   \/><label for='answer-id-1635373' id='answer-label-1635373' class=' answer'><span>HTTPS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422317[]' id='answer-id-1635374' class='answer   answerof-422317 ' value='1635374'   \/><label for='answer-id-1635374' id='answer-label-1635374' class=' answer'><span>SMTP<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-53' style=';'><div id='questionWrap-53'  class='   watupro-question-id-422318'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>53. <\/span>Which Unix command can enumerate RPC services running on a remote host?<\/div><input type='hidden' name='question_id[]' id='qID_53' value='422318' \/><input type='hidden' id='answerType422318' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422318[]' id='answer-id-1635375' class='answer   answerof-422318 ' value='1635375'   \/><label for='answer-id-1635375' id='answer-label-1635375' class=' answer'><span>iptables<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422318[]' id='answer-id-1635376' class='answer   answerof-422318 ' value='1635376'   \/><label for='answer-id-1635376' id='answer-label-1635376' class=' answer'><span>rpcinfo<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422318[]' id='answer-id-1635377' class='answer   answerof-422318 ' value='1635377'   \/><label for='answer-id-1635377' id='answer-label-1635377' class=' answer'><span>wget<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422318[]' id='answer-id-1635378' class='answer   answerof-422318 ' value='1635378'   \/><label for='answer-id-1635378' id='answer-label-1635378' class=' answer'><span>host<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-54' style=';'><div id='questionWrap-54'  class='   watupro-question-id-422319'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>54. <\/span>Which service in Exchange may expose email address enumeration through HTTP response codes?<\/div><input type='hidden' name='question_id[]' id='qID_54' value='422319' \/><input type='hidden' id='answerType422319' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422319[]' id='answer-id-1635379' class='answer   answerof-422319 ' value='1635379'   \/><label for='answer-id-1635379' id='answer-label-1635379' class=' answer'><span>OWA<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422319[]' id='answer-id-1635380' class='answer   answerof-422319 ' value='1635380'   \/><label for='answer-id-1635380' id='answer-label-1635380' class=' answer'><span>RPC<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422319[]' id='answer-id-1635381' class='answer   answerof-422319 ' value='1635381'   \/><label for='answer-id-1635381' id='answer-label-1635381' class=' answer'><span>POP3<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422319[]' id='answer-id-1635382' class='answer   answerof-422319 ' value='1635382'   \/><label for='answer-id-1635382' id='answer-label-1635382' class=' answer'><span>SMTP<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-55' style=';'><div id='questionWrap-55'  class='   watupro-question-id-422320'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>55. <\/span>Which of the following best describes the purpose of Google hacking in reconnaissance?<\/div><input type='hidden' name='question_id[]' id='qID_55' value='422320' \/><input type='hidden' id='answerType422320' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422320[]' id='answer-id-1635383' class='answer   answerof-422320 ' value='1635383'   \/><label for='answer-id-1635383' id='answer-label-1635383' class=' answer'><span>Exploiting web application vulnerabilities using Google tools<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422320[]' id='answer-id-1635384' class='answer   answerof-422320 ' value='1635384'   \/><label for='answer-id-1635384' id='answer-label-1635384' class=' answer'><span>Searching for expired SSL certificates<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422320[]' id='answer-id-1635385' class='answer   answerof-422320 ' value='1635385'   \/><label for='answer-id-1635385' id='answer-label-1635385' class=' answer'><span>Using advanced search operators to find exposed information or misconfigurations<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-422320[]' id='answer-id-1635386' class='answer   answerof-422320 ' value='1635386'   \/><label for='answer-id-1635386' id='answer-label-1635386' class=' answer'><span>Defacing vulnerable websites indexed by Google<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div style='display:none' id='question-56'>\n\t<div class='question-content'>\n\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\" alt=\"Loading...\" title=\"Loading...\" \/>&nbsp;Loading...\t<\/div>\n<\/div>\n\n<br \/>\n\t\n\t\t\t<div class=\"watupro_buttons flex \" id=\"watuPROButtons10682\" >\n\t\t  <div id=\"prev-question\" style=\"display:none;\"><input type=\"button\" value=\"&lt; Previous\" onclick=\"WatuPRO.nextQuestion(event, 'previous');\"\/><\/div>\t\t  \t\t  \t\t   \n\t\t   \t  \t\t<div><input type=\"button\" name=\"action\" class=\"watupro-submit-button\" onclick=\"WatuPRO.submitResult(event)\" id=\"action-button\" value=\"View Results\"  \/>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t<input type=\"hidden\" name=\"quiz_id\" value=\"10682\" id=\"watuPROExamID\"\/>\n\t<input type=\"hidden\" name=\"start_time\" id=\"startTime\" value=\"2026-05-23 18:13:52\" \/>\n\t<input type=\"hidden\" name=\"start_timestamp\" id=\"startTimeStamp\" value=\"1779560032\" \/>\n\t<input type=\"hidden\" name=\"question_ids\" value=\"\" \/>\n\t<input type=\"hidden\" name=\"watupro_questions\" value=\"422266:1635165,1635166,1635167,1635168 | 422267:1635169,1635170,1635171,1635172 | 422268:1635173,1635174,1635175,1635176 | 422269:1635177,1635178,1635179,1635180 | 422270:1635181,1635182,1635183,1635184 | 422271:1635185,1635186,1635187,1635188 | 422272:1635189,1635190,1635191,1635192,1635193 | 422273:1635194,1635195,1635196,1635197 | 422274:1635198,1635199,1635200,1635201 | 422275:1635202,1635203,1635204,1635205 | 422276:1635206,1635207,1635208,1635209 | 422277:1635210,1635211,1635212,1635213 | 422278:1635214,1635215,1635216,1635217 | 422279:1635218,1635219,1635220,1635221 | 422280:1635222,1635223,1635224,1635225 | 422281:1635226,1635227,1635228,1635229 | 422282:1635230,1635231,1635232,1635233 | 422283:1635234,1635235,1635236,1635237 | 422284:1635238,1635239,1635240,1635241 | 422285:1635242,1635243,1635244,1635245 | 422286:1635246,1635247,1635248,1635249 | 422287:1635250,1635251,1635252,1635253 | 422288:1635254,1635255,1635256,1635257 | 422289:1635258,1635259,1635260,1635261 | 422290:1635262,1635263,1635264,1635265 | 422291:1635266,1635267,1635268,1635269 | 422292:1635270,1635271,1635272,1635273 | 422293:1635274,1635275,1635276,1635277 | 422294:1635278,1635279,1635280,1635281 | 422295:1635282,1635283,1635284,1635285 | 422296:1635286,1635287,1635288,1635289 | 422297:1635290,1635291,1635292,1635293 | 422298:1635294,1635295,1635296,1635297 | 422299:1635298,1635299,1635300,1635301 | 422300:1635302,1635303,1635304,1635305,1635306 | 422301:1635307,1635308,1635309,1635310 | 422302:1635311,1635312,1635313,1635314 | 422303:1635315,1635316,1635317,1635318 | 422304:1635319,1635320,1635321,1635322 | 422305:1635323,1635324,1635325,1635326 | 422306:1635327,1635328,1635329,1635330 | 422307:1635331,1635332,1635333,1635334 | 422308:1635335,1635336,1635337,1635338 | 422309:1635339,1635340,1635341,1635342 | 422310:1635343,1635344,1635345,1635346 | 422311:1635347,1635348,1635349,1635350 | 422312:1635351,1635352,1635353,1635354 | 422313:1635355,1635356,1635357,1635358 | 422314:1635359,1635360,1635361,1635362 | 422315:1635363,1635364,1635365,1635366 | 422316:1635367,1635368,1635369,1635370 | 422317:1635371,1635372,1635373,1635374 | 422318:1635375,1635376,1635377,1635378 | 422319:1635379,1635380,1635381,1635382 | 422320:1635383,1635384,1635385,1635386\" \/>\n\t<input type=\"hidden\" name=\"no_ajax\" value=\"0\">\t\t\t<\/form>\n\t<p>&nbsp;<\/p>\n<\/div>\n\n<script type=\"text\/javascript\">\n\/\/jQuery(document).ready(function(){\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \t\nvar question_ids = \"422266,422267,422268,422269,422270,422271,422272,422273,422274,422275,422276,422277,422278,422279,422280,422281,422282,422283,422284,422285,422286,422287,422288,422289,422290,422291,422292,422293,422294,422295,422296,422297,422298,422299,422300,422301,422302,422303,422304,422305,422306,422307,422308,422309,422310,422311,422312,422313,422314,422315,422316,422317,422318,422319,422320\";\nWatuPROSettings[10682] = {};\nWatuPRO.qArr = question_ids.split(',');\nWatuPRO.exam_id = 10682;\t    \nWatuPRO.post_id = 108772;\nWatuPRO.store_progress = 0;\nWatuPRO.curCatPage = 1;\nWatuPRO.requiredIDs=\"0\".split(\",\");\nWatuPRO.hAppID = \"0.68494100 1779560032\";\nvar url = \"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/show_exam.php\";\nWatuPRO.examMode = 1;\nWatuPRO.siteURL=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-admin\/admin-ajax.php\";\nWatuPRO.emailIsNotRequired = 0;\nWatuPROIntel.init(10682);\nWatuPRO.inCategoryPages=1;});    \t \n<\/script>\n","protected":false},"excerpt":{"rendered":"<p>We know that the CREST Practitioner Security Analyst (CPSA) is an entry-level exam that tests your knowledge in assessing operating systems and common network services. If you are searching for the right study resources to make preparations, come to DumpsBase and gain success with the most current CREST-CPSA dumps (V8.02). Based on the CREST-CPSA exam [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19554,19555],"tags":[19556,19557],"class_list":["post-108772","post","type-post","status-publish","format-standard","hentry","category-crest","category-penetration-testing","tag-crest-practitioner-security-analyst-cpsa","tag-crest-cpsa-dumps"],"_links":{"self":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/108772","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/comments?post=108772"}],"version-history":[{"count":1,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/108772\/revisions"}],"predecessor-version":[{"id":108773,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/108772\/revisions\/108773"}],"wp:attachment":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/media?parent=108772"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/categories?post=108772"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/tags?post=108772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}