QUESTION: 18 While prioritizing findings and recommendations for an executive summary, which of the following considerations would De MOST valuable to the client?
QUESTION: 19 After several attempts, an attacker was able to gain unauthorized access through a biometric sensor using the attacker's actual fingerprint without explogtation. Which of the following is the MOST likely explanation of what happened? A. The biometric device is tuned more toward false positives B. The biometric device is configured more toward true negatives C. The biometric device is set to fail closed D. The biometnc device duplicated a valid user's fingerpnnt. Answer: A
QUESTION: 20 A penetration tester successfully explogts a DM2 server that appears to be listening on an outbound port The penetration tester wishes to forward that traffic back to a device Which of the following are the BEST tools to use few this purpose? (Select TWO)