A framework for security analysis is composed of a set of instructions,assumptions, and
limitations to analyze and solve security concerns and develop threat free applications.
Which of the following frameworks helps an organization in the evaluation of the company’s
information security with that of the industrial standards?
A.
Microsoft Internet Security Framework
B.
Information System Security Assessment Frame
C.
The IBM Security Framework
D.
Nortell’s Unified Security Framework
Information System Security Assessment Frame
Application security assessment is one of the activity that a pen tester performs in the
attack phase. It is designed to identify and assess threats to the organization through
bespoke, proprietary applications or systems. It checks the application so that a maliciou
user cannot access, modify, or destroy data or services within the system.
Identify the type of application security assessment which analyzes the application-based
code to confirm that it does not contain any sensitive information that an attacker might use
to exploit an application.
A.
Web Penetration Testing
B.
Functionality Testing
C.
Authorization Testing
D.
Source Code Review
Source Code Review
Which of the following is not the SQL injectionattack character?
A.
$
B.
PRINT
C.
#
D.
@@variable
$
DNS information records provide important data about:
A.
Phone and Fax Numbers
B.
Location and Type of Servers
C.
Agents Providing Service to Company Staff
D.
New Customer
Location and Type of Servers
An automated electronic mail message from a mail system which indicates that the user
does not exist on that server is called as?
A.
SMTP Queue Bouncing
B.
SMTP Message Bouncing
C.
SMTP Server Bouncing
D.
SMTP Mail Bouncing
SMTP Mail Bouncing
Reference:http://en.wikipedia.org/wiki/Bounce_message
Page 11 out of 40 Pages |
Previous |