Question 11
What is a purpose of a vulnerability management framework?
Question 12
An engineer needs to configure network systems to detect command and control communications by decrypting ingress and egress perimeter traffic and allowing network security devices to detect malicious outbound communications. Which technology should be used to accomplish the task?
Question 13
An intruder attempted malicious activity and exchanged emails with a user and received corporate information, including email distribution lists. The intruder asked the user to engage with a link in an email. When the fink launched, it infected machines and the intruder was able to access the corporate network.
Which testing method did the intruder use?
Question 14
A security incident occurred with the potential of impacting business services. Who performs the attack?
Question 15
What ate two denial-of-service (DoS) attacks? (Choose two)
