What will the following command produce on a website login page?
What will the following command produce on a website login page? SELECT email, passwd, login_id, full_name FROM members WHERE email = ‘someone@somehwere.com’; DROP TABLE members; –‘ A. Deletes the entire members table B. Inserts the Error! Reference source not found.email address into the members table C. Retrieves the password for the first user in the […]
Simon is a former employee of Trinitron XML Inc.
Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to hack into his former company’s network. Since Simon remembers some of the server names, he attempts to run the axfr and ixfr commands using DIG. What is Simon trying to accomplish here? A. Send DOS commands to […]
When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS
When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used? A. Passive IDS B. Active IDS C. Progressive IDS D. NIPS
Which of the following file system is used by Mac OS X?
Which of the following file system is used by Mac OS X? A. EFS B. HFS+ C. EXT2 D. NFS
Hackers can gain access to Windows Registry and manipulate user passwords, DNS settings, access rights or othe
Hackers can gain access to Windows Registry and manipulate user passwords, DNS settings, access rights or others features that they may need in order to accomplish their objectives. One simple method for loading an application at startup is to add an entry (Key) to the following Registry Hive: A. HKEY_LOCAL_MACHINE\hardware\windows\start B. HKEY_LOCAL_USERS\Software\Microsoft\old\Version\Load C. HKEY_CURRENT_USER\Microsoft\Default D. […]
The rule of thumb when shutting down a system is to pull the power plug.
The rule of thumb when shutting down a system is to pull the power plug. However, it has certain drawbacks. Which of the following would that be? A. Any data not yet flushed to the system will be lost B. All running processes will be lost C. The /tmp directory will be flushed D. Power […]
The efforts to obtain information before a trail by demanding documents, depositions, questioned and answers w
The efforts to obtain information before a trail by demanding documents, depositions, questioned and answers written under oath, written requests for admissions of fact and examination of the scene is a description of what legal term? A. Detection B. Hearsay C. Spoliation D. Discovery
Microsoft Outlook maintains email messages in a proprietary format in what type of file?
Microsoft Outlook maintains email messages in a proprietary format in what type of file? A. .email B. .mail C. .pst D. .doc
Law enforcement officers are conducting a legal search for which a valid warrant was obtained.
Law enforcement officers are conducting a legal search for which a valid warrant was obtained. While conducting the search, officers observe an item of evidence for an unrelated crime that was not included in the warrant. The item was clearly visible to the officers and immediately identified as evidence. What is the term used to […]
You are assisting in the investigation of a possible Web Server Hack.
You are assisting in the investigation of a possible Web Server Hack. The company who called you stated that customers reported to them that whenever they entered the web address of the company in their browser, what they received was a porno graphic web site. The company checked the web server and nothing appears wrong. […]