- (Exam Topic 2)
What are the three types of authentication?
Correct Answer:
B
- (Exam Topic 5)
If executives are found liable for not properly protecting their company's assets and information systems, what type of law would apply in this situation?
Correct Answer:
A
- (Exam Topic 6)
In IPv6 what is the major difference concerning application layer vulnerabilities compared to IPv4?
Correct Answer:
B
- (Exam Topic 2)
A pentester is using Metasploit to exploit an FTP server and pivot to a LAN. How will the pentester pivot using Metasploit?
Correct Answer:
D
- (Exam Topic 7)
Gavin owns a white-hat firm and is performing a website security audit for one of his clients. He begins by running a scan which looks for common misconfigurations and outdated software versions. Which of the following tools is he most likely using?
Correct Answer:
B