1. Right Answer: A
Explanation: Telnet is an insecure protocol that does not make use of encryption. The other protocols mentioned are all considered secure.
2. Right Answer: B
Explanation: Intrusion Detection Systems (IDSs) are a security control used to detect network or host attacks. The Internet of Things (IoT), Supervisory Control And Data Acquisition (SCADA) systems, and Industrial Control Systems (ICSs) are all associated with connecting physical world objects to a network.
3. Right Answer: A
Explanation: Omission of any findings would be unethical and counterproductive to the purpose of a penetration test.
4. Right Answer: C
Explanation: The component described is the executive summary. As hinted in the name, the executive summary aims to provide a 50,000-foot view of the penetration test report without relying on technical terms that may not mean anything to readers.
5. Right Answer: B
Explanation: Risk appetite is defined as the amount and kinds of risk an organization is willing to accept, and can be expected to drive much of the organization-s decision making when pursuing mitigation techniques for vulnerabilities discovered during a penetration test.