00:00

QUESTION 76

Which penetration testing technique requires the team to do the MOST work and effort?

Correct Answer: D

QUESTION 77

What does a breach refer to in the context of cybersecurity

Correct Answer: A

QUESTION 78

What is IPSEC reply attack

Correct Answer: D

QUESTION 79

Mark works in the security office. During research, Mark learns that a configuration change could better protect the organization's IT environment. Mark makes a proposal for this change, but the change cannot be implemented until it is approved, tested, and then cleared for deployment by the Change Control Board. This is an example of ______

Correct Answer: D

QUESTION 80

An attackers place themselves between two devices (often a web browser and a web server)

Correct Answer: C