Multiple Choice
Which of the following is an example of resource exhaustion?
A) A penetration tester requests every available IP address from a DHCP server.
B) An SQL injection attack returns confidential data back to the browser.
C) Server CPU utilization peaks at 100% during the reboot process.
D) System requirements for a new software package recommend having 12GB of RAM, but only 8GB are available.
Correct Answer:

Verified
Correct Answer:
Verified
Q6: An organization uses SSO authentication for employee
Q7: Which of the following is the appropriate
Q8: Which of the following physical security controls
Q9: A system administrator wants to provide balance
Q10: When an initialization vector is added to
Q12: A company hired a firm to test
Q13: A website administrator has received an alert
Q14: A business sector is highly competitive, and
Q15: A security administrator suspects a MITM attack
Q16: A systems administrator wants to protect data