Topic 1: Exam Pool A
You are looking for SQL injection vulnerability by sending a special character to web
applications. Which of the following is the most useful for quick validation?
A.
Double quotation
B.
Backslash
C.
Semicolon
D.
Single quotation
Single quotation
Why should the security analyst disable/remove unnecessary ISAPI filters?
A.
To defend against social engineering attacks
B.
To defend against webserver attacks
C.
To defend against jailbreaking
D.
To defend against wireless attacks
To defend against webserver attacks
A hacker named Jack is trying to compromise a bank’s computer system. He needs to
know the operating system of that computer to launch further attacks.
What process would help him?
A.
Banner Grabbing
B.
IDLE/IPID Scanning
C.
SSDP Scanning
D.
UDP Scanning
Banner Grabbing
Which of the following is used to indicate a single-line comment in structured query
language (SQL)?
A.
--
B.
||
C.
%%
D.
''
--
What is the most secure way to mitigate the theft of corporate information from a laptop
that was left in a hotel room?
A.
Set a BIOS password.
B.
Encrypt the data on the hard drive.
C.
Use a strong logon password to the operating system.
D.
Back up everything on the laptop and store the backup in a safe place.
Encrypt the data on the hard drive.
Page 21 out of 147 Pages |
Previous |