Topic 1: Exam Set A
When the operating system marks cluster as used, but does not allocate them to any file,
such clusters are known as ___________.
A.
Lost clusters
B.
Bad clusters
C.
Empty clusters
D.
Unused clusters
Lost clusters
Attackers can manipulate variables that reference files with "dot-dot-slash (./)" sequences and their variations such as
http://www.juggyDoy.corn/GET/process.php./././././././././etc/passwd.
Identify the attack referred.
A.
Directory traversal
B.
SQL Injection
C.
XSS attack
D.
File injection
Directory traversal
Attacker uses vulnerabilities in the authentication or session management functions such
as exposed accounts, session IDs, logout, password management, timeouts, remember
me. secret question, account update etc. to impersonate users, if a user simply closes the
browser without logging out from sites accessed through a public computer, attacker can
use the same browser later and exploit the user's privileges. Which of the following
vulnerability/exploitation is referred above?
A.
Session ID in URLs
B.
Timeout Exploitation
C.
I/O exploitation
D.
Password Exploitation
Timeout Exploitation
Digital evidence validation involves using a hashing algorithm utility to create a binary or
hexadecimal number that represents the uniqueness of a data set, such as a disk drive or
file.
Which of the following hash algorithms produces a message digest that is 128 bits long?
A.
CRC-32
B.
MD5
C.
SHA-1
D.
SHA-512
SHA-512
JPEG is a commonly used method of compressing photographic Images. It uses a
compression algorithm to minimize the size of the natural image, without affecting the
quality of the image. The JPEG lossy algorithm divides the image in separate blocks
of____________.
A.
4x4 pixels
B.
8x8 pixels
C.
16x16 pixels
D.
32x32 pixels
8x8 pixels
Page 2 out of 98 Pages |
Previous |