1. Right Answer: D
Explanation: Telnet is an insecure protocol that does not make use of encryption. The other protocols mentioned are considered secure.
2. Right Answer: A
Explanation: A web application to gain access is used by the attacker in an SQL Injection attack to an underlying database. The characteristic of these attacks is the use of semicolons and apostrophes.
3. Right Answer: C
Explanation: The organization-s risk appetite is its willingness to tolerate risk within the environment. If an organization is extremely risk averse, it may choose to conduct scans more frequently to minimize the amount of time between when a vulnerability comes into existence and when it is detected by a scan.
4. Right Answer: B
Explanation: While reporting and communication are important parts of vulnerability management, they are not included in the life cycle. The three life-cycle phases are detection, remediation, and testing.
5. Right Answer: D
Explanation: QualysGuard, Nessus, and OpenVAS are all examples of vulnerability scanning tools. Snort is an intrusion detection system.