Question 6 of 75
What step of the malware infection installs the malware on the target?
    Correct Answer: C

Question 7 of 75
The vulnerability that led to the WannaCry ransomware infections affected which protocol?
    Correct Answer: D

Question 8 of 75
Which of the registrars contains the information for the domain owners in Europe?
    Correct Answer: A

Question 9 of 75
Which component of the IT Security Model is attacked with interruption?
    Correct Answer: B

Question 10 of 75
In what default directory (fully qualified path) does nmap store scripts?
    Correct Answer: C