Question 71
A company receptionist received a threatening call referencing stealing assets and did not take any action assuming it was a social engineering attempt. Within 48 hours, multiple assets were breached, affecting the confidentiality of sensitive information. What is the threat actor in this incident?
Question 72
Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IP phones?
Question 73
Which regex matches only on all lowercase letters?
Question 74
An engineer receives a security alert that traffic with a known TOR exit node has occurred on the network.
What is the impact of this traffic?
What is the impact of this traffic?
Question 75
How does an SSL certificate impact security between the client and the server?