PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following injection flaws involves the injection of malicious code through a web application?

Injection flaws are web application vulnerabilities that allow untrusted data to be Interpreted and
executed as part of a command or query. Attackers exploit injection flaws by constructing malicious
commands or queries that result in data loss or corruption, lack of accountability, or denial of access.
Which of the following injection flaws involves the injection of malicious code through a web application?

Which of the following commands shows you the TCP and UDP network connections, listening ports, and the identi

Netstat is a tool for collecting Information regarding network connections. It provides a simple view of
TCP and UDP connections, and their state and network traffic statistics. Which of the following
commands shows you the TCP and UDP network connections, listening ports, and the identifiers?

The first eight digits of an IMEI number that provide information about the model and origin of the mobile dev

International Mobile Equipment Identifier (IMEI) is a 15-dlgit number that indicates the manufacturer,
model type, and country of approval for GSM devices. The first eight digits of an IMEI number that
provide information about the model and origin of the mobile device is also known as:

192.168.100.150, -, 03/6/11, 8:45:30, W3SVC2, SERVER, 172.15.10.30, 4210, 125, 3524, 100, 0, GET, /dollerlogo.

The IIS log file format is a fixed (cannot be customized) ASCII text-based format. The IIS format
includes basic items, such as client IP address, user name, date and time, service and instance, server
name and IP address, request type, target of operation, etc. Identify the service status code from the
following IIS log. 192.168.100.150, -, 03/6/11, 8:45:30, W3SVC2, SERVER, 172.15.10.30, 4210, 125,
3524, 100, 0, GET, /dollerlogo.gif,

Which of the following layer in web services stack is vulnerable to fault code leaks?

The evolution of web services and their increasing use in business offers new attack vectors in an
application framework. Web services are based on XML protocols such as web Services Definition
Language (WSDL) for describing the connection points, Universal Description, Discovery, and
Integration (UDDI) for the description and discovery of Web services and Simple Object Access
Protocol (SOAP) for communication between Web services that are vulnerable to various web
application threats. Which of the following layer in web services stack is vulnerable to fault code leaks?

Which of the following mobile operating systems is free and open source?

A mobile operating system is the operating system that operates a mobile device like a mobile phone,
smartphone, PDA, etc. It determines the functions and features available on mobile devices such as
keyboards, applications, email, text messaging, etc. Which of the following mobile operating systems is
free and open source?

Which of the following intrusion detection systems audit events that occur on a specific host?

An intrusion detection system (IDS) gathers and analyzes information from within a computer or a
network to identify any possible violations of security policy, including unauthorized access, as well as
misuse. Which of the following intrusion detection systems audit events that occur on a specific host?


Page 71 of 555« First...102030...6970717273...8090100...Last »