Which of the following tools in OSRFramework is used by attackers to check for a user profile on up to 290 different platforms? A. usufy.py B. phonefy.py C. entify.py D. searchfy.py {Ans: A}Which of the following communication protocols is a variant of the Wi-Fi standard that provides an extended range, making it useful for communications in rural areas, and offers low data rates? A. HaLow B. Z-Wave C. 6LoWPAN D. QUIC {Ans: C}Which of the following protocols uses AES and the Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP) for wireless data encryption? A. WEP B. WPA3 C. WPA2 D. WPA {Ans: C}In which of the following incident handling and response phases are the identified security incidents analyzed, validated, categorized, and prioritized? A. Incident recording and assignment B. Incident triage C. Containment D. Eradication {Ans: B}Kate, a disgruntled ex-employee of an organization, decided to hinder the operations of the organization and gather sensitive information by injecting malware into the organization's network. Which of the following categories of insiders does Kate belong to? A. Negligent insider B. Malicious insider C. Compromised insider D. Professional insider {Ans: B}An attacker is sending spoofed router advertisement messages