PrepAway - Latest Free Exam Questions & Answers

Author: admin

What is the next step to be done?

You are conducting pen-test against a company’s website using SQL Injection techniques. You enter “anything’ or 1=1 ” in the username field of an authentication form. This is the output returned from the server.
What is the next step to be done?

Why do you think this is possible?

Annie has just succeeded in stealing a secure cookie via a XSS attack. She is able to replay the cookie even while the session is valid on the server. Why do you think this is possible?

Assuming an attacker wants to penetrate John's network, which of the following options is he likely to ch

John has a proxy server on his network which caches and filters web access. He shuts down all unnecessary ports and services. Additionally, he has installed a firewall (Cisco PIX) that will not allow users to connect to any outbound ports. Jack, a network user has successfully connected to a remote server on port 80 using netcat. He could in turn drop a shell from the remote machine. Assuming an attacker wants to penetrate John’s network, which of the following options is he likely to choose?

One of the most common and the best way of cracking RSA encryption is to begin to derive the two prime numbers

One of the most common and the best way of cracking RSA encryption is to begin to derive the two prime numbers, which are used in the RSA PKI mathematical process. If the two numbers p and q are discovered through a _____________ process, then the private key can be derived.

What is the probable cause of Bill's problem?

Bill has successfully executed a buffer overflow against a Windows IIS web server. He has been able to spawn an interactive shell and plans to deface the main web page. He first attempts to use the “Echo” command to simply overwrite index.html and remains unsuccessful. He then attempts to delete the page and achieves no progress. Finally, he tries to overwrite it with another page in which also he remains unsuccessful. What is the probable cause of Bill’s problem?

How does a polymorphic shellcode work?

More sophisticated IDSs look for common shellcode signatures. But even these systems can be bypassed, by using polymorphic shellcode. This is a technique common among virus writers it basically hides the true nature of the shellcode in different disguises.
How does a polymorphic shellcode work?

What has Blake just accomplished?

Blake is in charge of securing all 20 of his company’s servers. He has enabled hardware and software firewalls, hardened the operating systems, and disabled all unnecessary services on all the servers. Unfortunately, there is proprietary AS400 emulation software that must run on one of the servers that requires the telnet service to function properly. Blake is especially concerned about this since telnet can be a very large security risk in an organization. Blake is concerned about how this particular server might look to an outside attacker so he decides to perform some footprinting, scanning, and penetration tests on the server.Blake telnets into the server and types in the following command:
HEAD / HTTP/1.0
After pressing enter twice, Blake gets the following results:
What has Blake just accomplished?


Page 187 of 231« First...102030...185186187188189...200210220...Last »