The URL may appear like this: https://www.xsecurity-bank.com/creditcard.asp?
The GET method should never be used when sensitive data such as credit card is being sent to a
CGI program. This is because any GET command will appear in the URL, and will be logged by
any servers. For example, let’s say that you’ve entered your credit card information into a form that
uses the GET method. The URL may appear like this:
https://www.xsecurity-bank.com/creditcard.asp?cardnumber=453453433532234
The GET method appends the credit card number to the URL. This means that anyone with
access to a server log will be able to obtain this information. How would you protect from this type
of attack?
Which of the following buffer overflow exploits are related to Microsoft IIS web server?
Which of the following buffer overflow exploits are related to Microsoft IIS web server? (Choose
three)
How will you defend against hardware keyloggers when using public computers and Internet Kiosks?
Keystroke logging is the action of tracking (or logging) the keys struck on a keyboard, typically in a
covert manner so that the person using the keyboard is unaware that their actions are being
monitored.
How will you defend against hardware keyloggers when using public computers and Internet Kiosks? (Select 4 answers)
which privilege does the web server software execute?
On a default installation of Microsoft IIS web server, under which privilege does the web server
software execute?
Why did this ping sweep only produce a few responses?
Lauren is performing a network audit for her entire company. The entire network is comprised of
around 500 computers. Lauren starts an ICMP ping sweep by sending one IP packet to the
broadcast address of the network, but only receives responses from around five hosts. Why did
this ping sweep only produce a few responses?
How can this help you in footprint the organization?
You are gathering competitive intelligence on XYZ.com. You notice that they have jobs listed on a
few Internet job-hunting sites. There are two job postings for network and system administrators.
How can this help you in footprint the organization?
What can Wayne infer from this traffic log?
Wayne is the senior security analyst for his company. Wayne is examining some traffic logs on a
server and came across some inconsistencies. Wayne finds some IP packets from a computer
purporting to be on the internal network. The packets originate from 192.168.12.35 with a TTL of
15. The server replied to this computer and received a response from 192.168.12.35 with a TTL of
21. What can Wayne infer from this traffic log?
What are the three phases involved in security testing?
What are the three phases involved in security testing?
What type of port scan is shown below?
How can you retrieve information from the outdated website?
You visit a website to retrieve the listing of a company’s staff members. But you can not find it on
the website. You know the listing was certainly present one year before. How can you retrieve
information from the outdated website?