Which of the following does the technician need to do?
A technician is testing the security of a new database application with a website front-end. The technician notices that when certain characters are input into the application it will crash the server. Which of the following does the technician need to do?
This type of message traffic is referred to as:
After registering an email address on a website, a user starts receiving messages from unknown sources. The email account is new, and therefore the user is concerned. This type of message traffic is referred to as:
In order to quickly replicate these controls on all systems, which of the following should be established?
An administrator has developed an OS install that will implement the tightest security controls possible. In order to quickly replicate these controls on all systems, which of the following should be established?
Which of the following mitigation techniques would address this concern? (Select TWO)
Users are utilizing thumb drives to connect to USB ports on company workstations. A technician is concerned that sensitive files can be copied to the USB drives. Which of the following mitigation techniques would address this concern? (Select TWO).
Which of the following is this an example of?
An unauthorized user intercepted a user’s password and used this information to obtain the company’s administrator password. The unauthorized user can use the administrators password to access sensitive information pertaining to client data. Which of the following is this an example of?
Which of the following is a security trait of a virtual machine?
Which of the following is a security trait of a virtual machine?
Which of the following is the BEST tool for allowing users to go to approved business-related websites only?
Which of the following is the BEST tool for allowing users to go to approved business-related websites only?
A smurf attack is an example of which of the following threats?
A smurf attack is an example of which of the following threats?
Which of the following virtual machine components monitors and manages the various virtual instances?
Which of the following virtual machine components monitors and manages the various virtual instances?
Which of the following would invalidate an SQL injection attack launched from the lookup field at the web serv
A company’s website allows customers to search for a product and display the current price and quantity available of each product from the production database. Which of the following would invalidate an SQL injection attack launched from the lookup field at the web server level?