One way to defeat a multi-level security solution is to leak data via…
One way to defeat a multi-level security solution is to leak data via…
Which of the following conditions must be given to allow a tester to exploit a Cross-Site Request Forgery (CSR
Which of the following conditions must be given to allow a tester to exploit a Cross-Site Request Forgery (CSRF) vulnerable web application?
What is the main difference between a -Normal- SQL Injection and a -Blind- SQL Injection vulnerability?
What is the main difference between a -Normal- SQL Injection and a -Blind- SQL Injection vulnerability?
During a penetration test, a tester finds a target that is running MS SQL 2000 with default credentials. The t
During a penetration test, a tester finds a target that is running MS SQL 2000 with default credentials. The tester assumes that the service is running with Local System account. How can this weakness be…
The precaution of prohibiting employees from bringing personal computing devices into a facility is what type
The precaution of prohibiting employees from bringing personal computing devices into a facility is what type of security control?
A pentester gains access to a Windows application server and needs to determine the settings of the built-in W
A pentester gains access to a Windows application server and needs to determine the settings of the built-in Windows firewall. Which command would be used?
Which of the following types of firewall inspects only header information in network traffic?
Which of the following types of firewall inspects only header information in network traffic?
During a penetration test, the tester conducts an ACK scan using NMAP against the external interface of the DM
During a penetration test, the tester conducts an ACK scan using NMAP against the external interface of the DMZ firewall. NMAP reports that port 80 is unfiltered. Based on this…
Firewalk has just completed the second phase (the scanning phase) and a technician receives the output show
Firewalk has just completed the second phase (the scanning phase) and a technician receives the output show…
Which of the following is an example of an asymmetric encryption implem…
Which of the following is an example of an asymmetric encryption implem…