What technique does Jimmy use to compromise a database?
Jimmy, an attacker, knows that he can take advantage of poorly designed input validation routines to create or alter SQL commands to gain access to private data or execute commands in the database. What technique does Jimmy use to compromise a database?
How long will it take to crack the password by an attacker?
You have chosen a 22 character word from the dictionary as your password. How long will it take to crack the password by an attacker?
Data is sent over the network as clear text (unencrypted) when Basic Authentication is configured on Web Serve
Data is sent over the network as clear text (unencrypted) when Basic Authentication is configured on Web Servers.
Which type of hacker represents the highest risk to your network?
Which type of hacker represents the highest risk to your network?
Who is considered an insider?
A majority of attacks come from insiders, people who have direct access to a company’s computer system as part of their job function or a business relationship. Who is considered an insider?
How would you describe Jason’s behavior within a security context?
Jake works as a system administrator at Acme Corp. Jason, an accountant of the firm befriends him at the canteen and tags along with him on the pretext of appraising him about potential tax benefits. Jason waits for Jake to swipe his access card and follows him through the open door into the secure systems area. How would you describe Jason’s behavior within a security context?
What is the best way to undermine the social engineering activity of tailgating?
Bob waits near a secured door, holding a box. He waits until an employee walks up to the secured door and uses the special card in order to access the restricted area of the target company. Just as the employee opens the door, Bob walks up to the employee (still holding the box) and asks the employee to hold the door open so that he can enter. What is the best way to undermine the social engineering activity of tailgating?
How does a denial-of-service attack work?
How does a denial-of-service attack work?
How do you defend against ARP spoofing?
How do you defend against ARP spoofing?
What is the command used to create a binary log file using tcpdump?
What is the command used to create a binary log file using tcpdump?