1. A hacker gains access to your organization - s network. During this attack, he is able to change some data and access some design plans that are protected by a U.S. patent. Which security tenets have been violated?
A) confidentiality, integrity, and availability
B) confidentiality and availability
C) integrity and availability
D) confidentiality and integrity
2. Which of the following creates an encrypted area to hold and quarantine corporate data separately from that of the users?
A) COPE
B) virtualization
C) VNC
D) containerization
3. In which type of test is the tester provided with limited knowledge of the network systems and devices, does the tester perform the test using publicly available information only, and does the organization - s security team knows that an attack is coming?
A) blind
B) double blind
C) fuzz
D) target
4. Which form of HSM is specifically suited to mobile apps?
A) Ethernet
B) serial
C) USB
D) microSD
5. OllyDbg is an example of which tool type?
A) sniffer
B) fuzzer
C) reverse engineering tools
D) network enumerator