Exhibit.

What kind of vulnerability is typically not identifiable through a standard vulnerability assessment?
Correct Answer:
C
What is the difference between BCP and DRP
Correct Answer:
B
The practice of sending fraudulent communications that appear to come from a reputable source
Correct Answer:
D
In what way do a victim's files get affected by ransomware?
Correct Answer:
B
What is the term used to denote the inherent set of privileges assigned to a user upon the creation of a new account?
Correct Answer:
C
