These hackers have limited or no training and know how to use only basic techniques or tools. What kind of hackers are we talking about?
Correct Answer:C
Why would you consider sending an email to an address that you know does not exist within the company you are performing a Penetration Test for?
Correct Answer:D
Which system consists of a publicly available set of databases that contain domain name registration contact information?
Correct Answer:A
An LDAP directory can be used to store information similar to a SQL database. LDAP uses a database structure instead of SQL’s structure. Because of this, LDAP has difficulty representing many-to-one relationships.
Correct Answer:C
A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?
Correct Answer:B