CertNexus Related Exams
ITS-110 Exam
A hacker enters credentials into a web login page and observes the server's responses. Which of the following attacks is the hacker attempting?
In order to gain access to a user dashboard via an online portal, an end user must provide their username, a PIN, and a software token code. This process is known as:
A hacker is attempting to exploit a known software flaw in an IoT portal in order to modify the site's administrative configuration. Which of the following BEST describes the type of attack the hacker is performing?