Question 26

Appending string values onto another string is called:
  • Question 27

    Which of the following would MOST likely be included in the final report of a static application-security test that was written with a team of application developers as the intended audience?
  • Question 28

    A company hired a penetration-testing team to review the cyber-physical systems in a manufacturing plant. The team immediately discovered the supervisory systems and PLCs are both connected to the company intranet. Which of the following assumptions, if made by the penetration-testing team, is MOST likely to be valid?
  • Question 29

    Which of the following tools would be MOST useful in collecting vendor and other security-relevant information for IoT devices to support passive reconnaissance?
  • Question 30

    A penetration-testing team is conducting a physical penetration test to gain entry to a building. Which of the following is the reason why the penetration testers should carry copies of the engagement documents with them?