Vulnerability scanners generally classify vulnerabilities by which of the following? (Choose two.)
An attacker intercepts a hash and compares it to pre-computed hashes to crack a password. Which of the following methods has been used?
Which answer option is a tactic of social engineering in which an attacker engages in an attack performed by phone?
Which of the following sources is best suited for monitoring threats and vulnerabilities?