- (Exam Topic 11)
Which of the following command line tools can be used in the reconnaisance phase of a network vulnerability assessment?
Correct Answer:A
- (Exam Topic 13)
As part of the security assessment plan, the security professional has been asked to use a negative testing strategy on a new website. Which of the following actions would be performed?
Correct Answer:D
- (Exam Topic 11)
Software Code signing is used as a method of verifying what security concept?
Correct Answer:A
- (Exam Topic 13)
What is the process of removing sensitive data from a system or storage device with the intent that the data cannot be reconstructed by any known technique?
Correct Answer:A
- (Exam Topic 9)
Which of the following is the BEST mitigation from phishing attacks?
Correct Answer:B