Multiple Choice
During an internal pentest, you setup a fake website and that offers some documentation and useful resources. You create a link and send it via email to a few key people. When they visit, code is run on their own machines that compromise their systems.
What form of attack is not taking place?
A) Cross Site Scripting
B) SQL Injection
C) Browser drive-by
D) Social Engineering
Correct Answer:

Verified
Correct Answer:
Verified
Q37: What are the 6 principles of social
Q38: Which of the following is considered to
Q39: Which of the following statements is the
Q40: You are conducting a test and got
Q41: A business manager is arguing with a
Q43: What is the most common method of
Q44: During a pentest, you notice the organization
Q45: Dave wants to steal the contact database
Q46: Karen gets hired on with disrupttheprocess.org to
Q47: Which of the following acts of the