How would you prevent session hijacking attacks?
How would you prevent session hijacking attacks?
Which of the following attacks takes best advantage of an existing authenticated connection?
Which of the following attacks takes best advantage of an existing authenticated connection?
Why is this considered to be more secure than Basic authentication?
Tess King is making use of Digest Authentication for her Web site. Why is this considered to be
more secure than Basic authentication?
Which of the following options would be your current privileges?
You have successfully run a buffer overflow attack against a default IIS installation running on a
Windows 2000 Server. The server allows you to spawn a shell. In order to perform the actions
you intend to do, you need elevated permission. You need to know what your current privileges
are within the shell. Which of the following options would be your current privileges?
which holds the least risk of detection?
You wish to determine the operating system and type of web server being used. At the same time
you wish to arouse no suspicion within the target organization.
While some of the methods listed below work, which holds the least risk of detection?
Which of the following tools can be used for that purpose?
Bart is looking for a Windows NT/2000/XP command-line tool that can be used to assign, display,
or modify ACL’s (access control lists) to files or folders and also one that can be used within batch
files.
Which of the following tools can be used for that purpose? (Choose the best answer)
Which of the following buffer overflow exploits are related to Microsoft IIS web server?
Which of the following buffer overflow exploits are related to Microsoft IIS web server? (Choose
three)
which privilege does the web server software execute?
On a default installation of Microsoft IIS web server, under which privilege does the web server
software execute?
How can this help you in footprint the organization?
You are gathering competitive intelligence on XYZ.com. You notice that they have jobs listed on a
few Internet job-hunting sites. There are two job postings for network and system administrators.
How can this help you in footprint the organization?
What are the three phases involved in security testing?
What are the three phases involved in security testing?