1. Right Answer: B
Explanation: In the phase of Enumeration, an attacker initiates active connections with the target system. Using this active connection, direct queries are generated to gain more information. This information helps to identify the system attack points.
2. Right Answer: A
Explanation: In brute-force attacks, a list of password or username is taken out and used to find the nearest hashes to crack a password.
3. Right Answer: B
Explanation: Spear Phishing attacks are directed to particular organizations or individuals. It is an electronic communication scam to collect details or information about a particular target to fill emails with an authentic context. Attackers even hijack business emails communication and create a highly customized message.
4. Right Answer: C
Explanation: VLAN Hopping is a method of attacking network resources on a Virtual LAN (VLAN).
5. Right Answer: B
Explanation: In Credential Harvesting, the attacker sends the victim a captivating message which is typically an email containing a tenable subject and a hyperlink and lead to a sign in page that the victim is known to use. The most common are Google Drive, Office 365, and Dropbox.