Which of the following is the best way an attacker can passively learn about technologies used in an organizat
Which of the following is the best way an attacker can passively learn about technologies used in
an organization?
What will the following command produce on a website’s login page if executed successfully?
What will the following command produce on a website’s login page if executed successfully?
SELECT email, passwd, login_id, full_name FROM members WHERE email =
‘someone@somewhere.com’; DROP TABLE members; –‘
Which of the following is most effective against passwords?
Which of the following is most effective against passwords?
What would you call this kind of activity?
Oregon Corp is fighting a litigation suit with Scamster Inc. Oregon has assigned a private
investigative agency to go through garbage, recycled paper, and other rubbish at Scamster’s office
site in order to find relevant information. What would you call this kind of activity?
What can you infer from the exploit given?
The following excerpt is taken from a honeypot log that was hosted at lab.wiretrip.net. Snort
reported Unicode attacks from 213.116.251.162. The file Permission Canonicalization vulnerability
(UNICODE attack) allows scripts to be run in arbitrary folders that do not normally have the right to
run scripts. The attacker tries a Unicode attack and eventually succeeds in displaying boot.ini.
He then switches to playing with RDS, via msadcs.dll. The RDS vulnerability allows a malicious
user to construct SQL statements that will execute shell commands (such as CMD.EXE) on the IIS
server. He does a quick query to discover that the directory exists, and a query to msadcs.dll
shows that it is functioning correctly. The attacker makes a RDS query which results in the
commands run as shown below:
What can you infer from the exploit given?
One way to defeat a multi-level security solution is to leak data via
One way to defeat a multi-level security solution is to leak data via
What type of port scan is represented here?
Choose the attack type from the choices given below.
Bill is attempting a series of SQL queries in order to map out the tables within the database that he
is trying to exploit.
Choose the attack type from the choices given below.
which of the following commands will start the Nessus client in the background so that the Nessus server can b
On a Linux device, which of the following commands will start the Nessus client in the background
so that the Nessus server can be configured?