Least privilege is a security concept that requires that a user is
Least privilege is a security concept that requires that a user is
What would you call such an attack?
Your boss Tess King is attempting to modify the parameters of a Web-based application in order
to alter the SQL statements that are parsed to retrieve data from the database. What would you
call such an attack?
A covert channel is a channel that
A covert channel is a channel that
what would be among the first steps that he would perform?
When a malicious hacker identifies a target and wants to eventually compromise this target, what
would be among the first steps that he would perform? (Choose the best answer)
which technology to format information?
SOAP services use which technology to format information?
How would an attacker use this technique to compromise a database?
A particular database threat utilizes a SQL injection technique to penetrate a target system. How
would an attacker use this technique to compromise a database?
What type of scan is this?
A security engineer is attempting to map a company’s internal network. The engineer enters in the
following NMAP commanD.
NMAP –n –sS –P0 –p 80 ***.***.**.**
What type of scan is this?
What will it return?
Look at the following SQL query.
SELECT * FROM product WHERE PCategory=’computers’ or 1=1–‘
What will it return? Select the best answer.
Which of the following is a hashing algorithm?
Which of the following is a hashing algorithm?
What do you think is the reason behind this?
Sandra is conducting a penetration test for XYZ.com. She knows that XYZ.com is using wireless
networking for some of the offices in the building right down the street. Through social engineering
she discovers that they are using 802.11g. Sandra knows that 802.11g uses the same 2.4GHz
frequency range as 802.11b. Using NetStumbler and her 802.11b wireless NIC, Sandra drives
over to the building to map the wireless networks. However, even though she repositions herself
around the building several times, Sandra is not able to detect a single AP.
What do you think is the reason behind this?