Which tool is used to automate SQL injections and exploit a database by forcing a given web application to con
Which tool is used to automate SQL injections and exploit a database by forcing a given web
application to connect to another database controlled by a hacker?
Which security policy must the security analyst check to see if dial-out modems are allowed?
A security analyst is performing an audit on the network to determine if there are any deviations
from the security policies in place. The analyst discovers that a user from the IT department had a
dial-out modem installed. Which security policy must the security analyst check to see if dial-out
modems are allowed?
What is the most efficient way to crack the passwords for the AD users?
A company is using Windows Server 2003 for its Active Directory (AD). What is the most efficient
way to crack the passwords for the AD users?
which of the following?
When an alert rule is matched in a network-based IDS like snort, the IDS does which of the
following?
which of the following?
Passive reconnaissance involves collecting information through which of the following?
which type of packet inspection is the firewall conducting?
During a penetration test, the tester conducts an ACK scan using NMAP against the external
interface of the DMZ firewall. NMAP reports that port 80 is unfiltered. Based on this response,
which type of packet inspection is the firewall conducting?
What is the main reason the use of a stored biometric is vulnerable to an attack?
What is the main reason the use of a stored biometric is vulnerable to an attack?
Which of the following types of firewall inspects only header information in network traffic?
Which of the following types of firewall inspects only header information in network traffic?
which cryptanalytic technique to attempt to discover the encryption key?
An attacker sniffs encrypted traffic from the network and is subsequently able to decrypt it. The
attacker can now use which cryptanalytic technique to attempt to discover the encryption key?
which of the following problems?
Low humidity in a data center can cause which of the following problems?