Which two components reduce the attack surface on an endpoint? (Choose two.)
What is an attack surface as compared to a vulnerability?
An intruder attempted malicious activity and exchanged emails with a user and received corporate information, including email distribution lists. The intruder asked the user to engage with a link in an email. When the fink launched, it infected machines and the intruder was able to access the corporate network.Which testing method did the intruder use?
What are two social engineering techniques? (Choose two.)
Refer to the exhibit. What does the output indicate about the server with the IP address 172.18.104.139?
What is a benefit of agent-based protection when compared to agentless protection?