Select the vulnerability scan type that will use only the available information to hypothesize the status of the vulnerability.
A DNS amplification attack floods an unsuspecting victim by…
A DNS amplification attack floods an unsuspecting victim by redirecting valid responses to it.
What class of attacks use innovative attack tools and once a…
What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended period?
A correlation engine aggregates and correlates content from…
A correlation engine aggregates and correlates content from different sources to uncover an attack.
How can an area be made secure from a non-secured area via t…
How can an area be made secure from a non-secured area via two interlocking doors to a small room?
What type of computer code is typically added to a legitimat…
What type of computer code is typically added to a legitimate program but lies dormant until a specific logical event triggers it?
What dedicated hardware device aggregates hundreds or thousa…
What dedicated hardware device aggregates hundreds or thousands of VPN connections?
A collision attack is an attempt to find two input strings o…
A collision attack is an attempt to find two input strings of a hash function that produce the same hash result.
What process describes using technology as a basis for contr…
What process describes using technology as a basis for controlling the access and usage of sensitive data?
What are the end products of photosynthesis? Choose all that…
What are the end products of photosynthesis? Choose all that apply.