1. Right Answer: B
Explanation: A dictionary attack uses existing wordlists that get expanded whenever real-world passwords are discovered.
2. Right Answer: A
Explanation: Vulnerability mapping is the process of detailing identified vulnerabilities and their locations, whether they are physical (no cameras or guards at a back entrance, for instance) or logical (such as SMBv1 being enabled on a Windows 2008 server).
3. Right Answer: C
Explanation: Enumeration is the process of finding all available information on a target system or service in support of developing a plan of attack.
4. Right Answer: B
Explanation: IDA or the Interactive Disassembler is a disassembly tool that can generate assembly language source code for an application that is the executable directly, and is not a vulnerability scanning tool.
5. Right Answer: C
Explanation: Common Vulnerabilities and Exposure (CVE) maintains the list of known vulnerabilities including an identification number and description of those cybersecurity vulnerabilities.