Topic 1: Exam Pool A
If an attacker uses the command SELECT*FROM user WHERE name = ‘x’ AND userid IS
NULL; -‘; which type of SQL injection attack is the attacker performing?
A.
End of Line Comment
B.
UNION SQL Injection
C.
Illegal/Logically Incorrect Query
D.
Tautology
Tautology
When tuning security alerts, what is the best approach?
A.
Tune to avoid False positives and False Negatives
B.
Rise False positives Rise False Negatives
C.
Decrease the false positives
D.
Decrease False negatives
Tune to avoid False positives and False Negatives
Which of the following is an adaptive SQL Injection testing technique used to discover
coding errors by inputting massive amounts of random data and observing the changes in
the output?
A.
Function Testing
B.
Dynamic Testing
C.
Static Testing
D.
Fuzzing Testing
Fuzzing Testing
From the following table, identify the wrong answer in terms of Range (ft).
A.
802.11b
B.
802.11g
C.
802.16(WiMax)
D.
802.11a
802.11a
You are a Penetration Tester and are assigned to scan a server. You need to use a
scanning technique wherein the TCP Header is split into many packets so that it becomes
difficult to detect what the packets are meant for.
Which of the below scanning technique will you use?
A.
ACK flag scanning
B.
TCP Scanning
C.
IP Fragment Scanning
D.
Inverse TCP flag scanning
IP Fragment Scanning
Page 19 out of 147 Pages |
Previous |