Question 11
Which two mechanisms are used to control phishing attacks? (Choose two.)
Question 12
Which attack is commonly associated with C and C++ programming languages?
Question 13
Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two.)
Question 14
Which two kinds of attacks are prevented by multifactor authentication? (Choose two.)
Question 15
What are two rootkit types? (Choose two.)
Question 16
How is DNS tunneling used to exfiltrate data out of a corporate network?
Question 17
Which type of attack is social engineering?
Question 18
What are two DDoS attack categories? (Choose two.)
Question 19
In which type of attack does the attacker insert their machine between two hosts that are communicating with each other?
Question 20
How does Cisco Advanced Phishing Protection protect users?