Question 16

What types of web application vulnerabilities continue to be the MOST prolific according to the OWASP Top 10?
  • Question 17

    Ensuring the correctness of data inputted to a system is an example of which facet of information security?
  • Question 18

    Which of the following uses are NOT usual ways that attackers have of leveraging botnets?
  • Question 19

    In business continuity (BC) terms, what is the name of the individual responsible for recording all pertinent information associated with a BC exercise or real plan invocation?
  • Question 20

    What is the name of the method used to illicitly target a senior person in an organisation so as to try to coerce them Into taking an unwanted action such as a misdirected high-value payment?