Which two mechanisms are used to control phishing attacks? (Choose two.)
AE
Which attack is commonly associated with C and C++ programming languages?
D
Reference:
https://en.wikipedia.org/wiki/Buffer_overflow
Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two.)
AB
Reference:
https://en.wikipedia.org/wiki/SQL_injection
Which two kinds of attacks are prevented by multifactor authentication? (Choose two.)
AB
What are two rootkit types? (Choose two.)
CD
How is DNS tunneling used to exfiltrate data out of a corporate network?
B
Which type of attack is social engineering?
C
What are two DDoS attack categories? (Choose two.)
AE
In which type of attack does the attacker insert their machine between two hosts that are communicating with each other?
A
How does Cisco Advanced Phishing Protection protect users?
B