Question 36
The Key Reinstallation Attack (KRACK) vulnerability is specific to which types of devices? (Choose two.)
Question 37
Various logs are collected for a data leakage case to make a forensic analysis. Which of the following are MOST important for log integrity? (Choose two.)
Question 38
A security professional discovers a new ransomware strain that disables antivirus on the endpoint during an infection. Which location would be the BEST place for the security professional to find technical information about this malware?
Question 39
Which of the following, when exposed together, constitutes PII? (Choose two.)
Question 40
Which of the following security best practices should a web developer reference when developing a new web- based application?