Identify the attack when an attacker by several trial and error can read the contents of a password file prese
Identify the attack when an attacker by several trial and error can read the contents of a password file present in the restricted etc folder just by manipulating the URL in the browser as shown: http://www.terabytes.com/process.php./../../../../etc/passwd A. Directory Traversal Attack B. SQL Injection Attack C. Denial-of-Service Attack D. Form Tampering Attack Reference: https://doc.lagout.org/security/SQL%20Injection%20Attacks%20and%20Defense.pdf
What is Ray and his team doing?
Ray is a SOC analyst in a company named Queens Tech. One Day, Queens Tech is affected by a DoS/DDoS attack. For the containment of this incident, Ray and his team are trying to provide additional bandwidth to the network devices and increasing the capacity of the servers. What is Ray and his team doing? […]
Which of the following command is used to enable logging in iptables?
Which of the following command is used to enable logging in iptables? A. $ iptables -B INPUT -j LOG B. $ iptables -A OUTPUT -j LOG C. $ iptables -A INPUT -j LOG D. $ iptables -B OUTPUT -j LOG Reference: https://tecadmin.net/enable-logging-in-iptables-on-linux/
Which of the following directory will contain logs related to printer access?
Which of the following directory will contain logs related to printer access? A. /var/log/cups/Printer_log file B. /var/log/cups/access_log file C. /var/log/cups/accesslog file D. /var/log/cups/Printeraccess_log file
Which one of the following is the correct flow for Setting Up a Computer Forensics Lab?
Which one of the following is the correct flow for Setting Up a Computer Forensics Lab? A. Planning and budgeting –> Physical location and structural design considerations –> Work area considerations –> Human resource considerations –> Physical security recommendations –> Forensics lab licensing B. Planning and budgeting –> Physical location and structural design considerations–> Forensics […]
According to the forensics investigation process, what is the next step carried out right after collecting the
According to the forensics investigation process, what is the next step carried out right after collecting the evidence? A. Create a Chain of Custody Document B. Send it to the nearby police station C. Set a Forensic lab D. Call Organizational Disciplinary Team
What is the primary step that is advisable to Bonney in order to contain the malware incident from spreading?
Bonney’s system has been compromised by a gruesome malware. What is the primary step that is advisable to Bonney in order to contain the malware incident from spreading? A. Complaint to police in a formal way regarding the incident B. Turn off the infected machine C. Leave it to the network administrators to handle D. […]
What command is used to determine if the entry is present in DNS cache?
DNS cache snooping is a process of determining if the specified resource address is present in the DNS cache records. It may be useful during the examination of the network to determine what software update resources are used, thus discovering what software is installed. What command is used to determine if the entry is present […]
What is the most likely cause?
An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempts to correlate the information in all of the logs, the sequence of many of the […]
Which of the following tools performs comprehensive tests against web servers, including dangerous files and C
Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs? A. Nikto B. John the Ripper C. Dsniff D. Snort