A high-level government official uses anonymous bank accounts to transfer a requested amount
of funds to individuals in another country.
These individuals are known for defacing government websites and exfiltrating sensitive data.
Which of the following BEST describes the involved threat actors?
A. State-sponsored hackers
B. Gray hat hackers
C. Hacktivists
D. Cyber terrorists
Answer: D
Which of the following technologies is used as mitigation to XSS attacks?
A. Intrusion prevention
B. Proxy filtering
C. Web application firewall
D. Intrusion detection
Answer: C