PrepAway - Latest Free Exam Questions & Answers

Tag: 312-50

What is the next step to be done?

You are conducting pen-test against a company’s website using SQL Injection techniques. You enter “anything’ or 1=1 ” in the username field of an authentication form. This is the output returned from the server.
What is the next step to be done?

Why do you think this is possible?

Annie has just succeeded in stealing a secure cookie via a XSS attack. She is able to replay the cookie even while the session is valid on the server. Why do you think this is possible?

Assuming an attacker wants to penetrate John's network, which of the following options is he likely to ch

John has a proxy server on his network which caches and filters web access. He shuts down all unnecessary ports and services. Additionally, he has installed a firewall (Cisco PIX) that will not allow users to connect to any outbound ports. Jack, a network user has successfully connected to a remote server on port 80 using netcat. He could in turn drop a shell from the remote machine. Assuming an attacker wants to penetrate John’s network, which of the following options is he likely to choose?

One of the most common and the best way of cracking RSA encryption is to begin to derive the two prime numbers

One of the most common and the best way of cracking RSA encryption is to begin to derive the two prime numbers, which are used in the RSA PKI mathematical process. If the two numbers p and q are discovered through a _____________ process, then the private key can be derived.

Which of the following ethereal filters will you configure to display only the packets with hotmail e- mail me

You are sniffing an unprotected WiFI network located in a JonDonalds Cybercafe with Ethereal to capture hotmail e-mail traffic. You see lots of people using their laptops browsing the web while sipping brewed coffee from JonDonalds. You want to sniff their e-mail messages traversing the unprotected WiFi network.
Which of the following ethereal filters will you configure to display only the packets with hotmail e- mail messages?

What is the probable cause of Bill's problem?

Bill has successfully executed a buffer overflow against a Windows IIS web server. He has been able to spawn an interactive shell and plans to deface the main web page. He first attempts to use the “Echo” command to simply overwrite index.html and remains unsuccessful. He then attempts to delete the page and achieves no progress. Finally, he tries to overwrite it with another page in which also he remains unsuccessful. What is the probable cause of Bill’s problem?


Page 51 of 150« First...102030...4950515253...607080...Last »