Question 16
What types of web application vulnerabilities continue to be the MOST prolific according to the OWASP Top 10?
Question 17
Ensuring the correctness of data inputted to a system is an example of which facet of information security?
Question 18
Which of the following uses are NOT usual ways that attackers have of leveraging botnets?
Question 19
In business continuity (BC) terms, what is the name of the individual responsible for recording all pertinent information associated with a BC exercise or real plan invocation?
Question 20
What is the name of the method used to illicitly target a senior person in an organisation so as to try to coerce them Into taking an unwanted action such as a misdirected high-value payment?