Question 6 of 80
Vulnerability scanners generally classify vulnerabilities by which of the following? (Choose two.)
Correct Answer: C, D

Question 7 of 80
Which standard was implemented in the United States to protect the privacy of patient medical information through restricted access to medical records and regulations for sharing medical records?
Correct Answer: D

Question 8 of 80
Which answer option is a tactic of social engineering in which an attacker engages in an attack performed by phone?
Correct Answer: C

Question 9 of 80
Which three answer options are password attack methods and techniques? (Choose three.)
Correct Answer: B, D, E

Question 10 of 80
What describes the BEST approach for developing a plan to continuously assess and track vulnerabilities on all organizational assets and infrastructure in order to remediate and minimize the opportunity for attacks?
Correct Answer: A