Question 36

The Key Reinstallation Attack (KRACK) vulnerability is specific to which types of devices? (Choose two.)
  • Question 37

    Various logs are collected for a data leakage case to make a forensic analysis. Which of the following are MOST important for log integrity? (Choose two.)
  • Question 38

    A security professional discovers a new ransomware strain that disables antivirus on the endpoint during an infection. Which location would be the BEST place for the security professional to find technical information about this malware?
  • Question 39

    Which of the following, when exposed together, constitutes PII? (Choose two.)
  • Question 40

    Which of the following security best practices should a web developer reference when developing a new web- based application?