Topic 1: Exam Pool A
In Wireshark, the packet bytes panes show the data of the current packet in which format?
A.
Decimal
B.
ASCII only
C.
Binary
D.
Hexadecimal
Hexadecimal
A virus that attempts to install itself inside the file it is infecting is called?
A.
Tunneling virus
B.
Cavity virus
C.
Polymorphic virus
D.
Stealth virus
Cavity virus
Bob, your senior colleague, has sent you a mail regarding a deal with one of the clients.
You are requested to accept the offer and you oblige. After 2 days. Bob denies that he had
ever sent a mail. What do you want to ""know"" to prove yourself that it was Bob who had
send a mail?
A.
Authentication
B.
Confidentiality
C.
Integrity
D.
Non-Repudiation
Non-Repudiation
What type of vulnerability/attack is it when the malicious person forces the user’s browser
to send an authenticated request to a server?
A.
Cross-site request forgery
B.
Cross-site scripting
C.
Session hijacking
D.
Server side request forgery
Cross-site request forgery
Which one of the following Google advanced search operators allows an attacker to restrict
the results to those websites in the given domain?
A.
[cache:]
B.
[site:]
C.
[inurl:]
D.
[link:
[site:]
Page 7 out of 147 Pages |
Previous |