Which command would be used?
A pentester gains access to a Windows application server and needs to determine the settings of the built-in
Windows firewall. Which command would be used?
what type of security control?
The precaution of prohibiting employees from bringing personal computing devices into a facility is what type of
security control?
How can this weakness be exploited to access the system?
During a penetration test, a tester finds a target that is running MS SQL 2000 with default credentials. The
tester assumes that the service is running with Local System account. How can this weakness be exploited to
access the system?
What is the main difference between a “Normal” SQL Inje…
What is the main difference between a “Normal” SQL Injection and a “Blind” SQL Injection vulnerability?
Which of the following conditions must be given to allo…
Which of the following conditions must be given to allow a tester to exploit a Cross-Site Request Forgery
(CSRF) vulnerable web application?
One way to defeat a multi-level security solution is to…
One way to defeat a multi-level security solution is to leak data via
What is the name of the international standard that est…
What is the name of the international standard that establishes a baseline level of confidence in the security
functionality of IT products by providing a set of requirements for evaluation?
Which type of antenna is used in wireless communication?
Which type of antenna is used in wireless communication?
Which of the following attacks should be used to obtain…
During a wireless penetration test, a tester detects an access point using WPA2 encryption. Which of the
following attacks should be used to obtain the key?
What is the main reason the use of a stored biometric i…
What is the main reason the use of a stored biometric is vulnerable to an attack?