- (Topic 4)
Which of the following Trojans does not use TCP protocol?
Correct Answer:
C
- (Topic 1)
You have been contracted to penetration test an e-mail server for a client that wants to know for sure if the sendmail service is vulnerable to any known attacks. You have permission to run any type of test, how will you proceed to give the client the most valid answer?
Correct Answer:
C
- (Topic 1)
In the screen shot below, which selections would you need click in order to intercept and alter all http traffic passing through OWASP ZAP?
Correct Answer:
B
- (Topic 4)
Which of the following enables an inventor to legally enforce his right to exclude others from using his invention?
Correct Answer:
C
- (Topic 1)
You've been contracted by the owner of a secure facility to try and break into their office in the middle of the night. Your client requested photographs of any sensitive information found as proof of your accomplishments. The job you've been hired to perform is an example of what practice?
Correct Answer:
B