Q&A
The answers to these questions appear in Appendix A. For more practice with exam format questions, use the Pearson Test Prep software online.
What is the term for an attack in which the threat actor gains access to a user or an application account and uses it to gain access to additional accounts and information?
What type of attack can reveal the origin network or IP address behind a content delivery network (CDN) or a large proxy placed in front of web services in a cloud provider and could allow attackers to bypass different anti-DDoS mitigations?
What attacks are often based on information gained from the implementation of an underlying computer system or a cloud environment instead of a specific weakness in the implemented technology or algorithm?
What framework of API documentation and development is the basis of the OpenAPI Specification (OAS) and can be leveraged in penetration testing engagements to gain insights about an API?
What is the process of analyzing a compiled mobile app to extract information about its source code?
When an attacker uses legitimate transactions and flows of an application in a way that results in a negative or malicious behavior, what type of vulnerability is the attacker exploiting?
What is the name given to industrial control systems connected to the Internet?
What mobile operating system can be scanned and analyzed using the open-source tool needle?
_______ is a dynamic instrumentation toolkit for security researchers and reverse engineers to test mobile devices and applications.
What is the name of a collection of compute interface specifications (often used by IoT systems) design to offer management and monitoring capabilities independently of the host system’s CPU, firmware, and operating system?