1. Right Answer: D
Explanation: There are different types of vulnerability assessment such as: Active Assessment Passive Assessment Internal Assessment External Assessment
2. Right Answer: D
Explanation: Embedded system is not a common technique to complete attack, it is an integrated system and dedicated computer, including both hardware and software.
3. Right Answer: D
Explanation: Phishing is not a type of human-based social engineering. It is a technique in which a fake email that looks like an authentic email is sent to a target host.
4. Right Answer: B
Explanation: Dictionary Attack is used to perform password cracking; a password cracking application is used along with a dictionary file.
5. Right Answer: C
Explanation: Piggybacking is the technique in which an unauthorized person waits for an authorized person to gain entry in a restricted are