The 100 multiple-choice questions provided here help you to determine how prepared you are for the actual exam and which topics you need to review further. Write down your answers on a separate sheet of paper so that you can take this exam again if necessary. Compare your answers against the answer key that follows this exam. Following the answer key are detailed explanations for each question.
1. Why would you use a vulnerability scanner? Select the best answer.
A. To identify open ports on a computer
B. To identify remote access policies
C. To crack passwords
D. To see whether passwords are sent as clear text
2. What is another name for a malicious attacker?
A. White hat
B. Penetration tester
C. Fuzzer ...