In the ____ exploit, the penetration tester is more likely to be mimicking the actions of somebody who is either local, or who has some knowledge of the target.

A. partial-knowledge
B. zero-knowledge
C. full-knowledge
D. open-knowledge

Answer: A

Computer Science & Information Technology

You might also like to view...

In Excel, columns are identified by numbers and rows by letters

Indicate whether the statement is true or false

Computer Science & Information Technology

What do the words Compatibility Mode in the title bar tell you about the document you have opened?

A) The file was most likely created in the newest version of Word. B) You cannot save the document as a Word 2013 file. C) The file is saved in Rich Text Format. D) The file was most likely created in an earlier version of Word, which means that some Word 2013 features might not be available or viewable.

Computer Science & Information Technology