We've detected that Javascript is not enabled. It is required for an optimal survey taking experience. Please check your browser's settings and make sure Javascript is turned on. Learn how to enable Javascript.
4. During a penetration test, Mitch discovers child pornography on a client's computer. Which of the following actions should he take?
5. Brandon is helping Fred with his computer. He needs Fred to enter his username and password into the system. Fred enters the username and password while Brandon is watching him. Brandon explains to Fred that it is not a good idea to allow anyone to watch you type in usernames or passwords. Which type of social engineering attack is Fred referring to?
9. You have just run the John the Ripper command shown in the image. Which of the following was this command used for?