Packet filtering firewalls are usually a part of a router. In a packet filtering firewall, each
packet is compared to a set of criteria before it is forwarded.
Depending on the packet and the criteria, the firewall can:
i)Drop the packet
ii)Forward it or send a message to the originator
At which level of the OSI model do the packet filtering firewalls work?
A.
Application layer
B.
Physical layer
C.
Transport layer
D.
Network layer
Network layer
Reference:http://books.google.com.pk/books?id=KPjLAyA7HgoC&pg=PA208&lpg=PA208&
dq=At+which+level+of+the+OSI+model+do+the+packet+filtering+firewalls+work&source=bl
&ots=zRrbcmY3pj&sig=I3vuS3VA7r-
3VF8lC6xq_c_r31M&hl=en&sa=X&ei=wMcfVMetI8HPaNSRgPgD&ved=0CC8Q6AEwAg#v
=onepage&q=At-which-level-of-the-OSI-model-do-the-pa
cket-filtering-firewalls-work&f=false(packet filters)
What is the maximum value of a “tinyint” field in most database systems?
A.
222
B.
224 or more
C.
240 or less
D.
225 or more
225 or more
Reference:http://books.google.com.pk/books?id=JUcIAAAAQBAJ&pg=SA3-PA3&lpg=SA3-
PA3&dq=maximum+value+of+a+%E2%80%9Ctinyint%E2%80%9D+field+in+most+databa
se+systems&source=bl&ots=NscGk-
R5r&sig=1hMOYByxt7ebRJ4UEjbpxMijTQs&hl=en&sa=X&ei=pvgeVJnTCNDkaI_fgugO&v
ed=0CDYQ6AEwAw#v=onepage&q=maximum-value-of-a-%E2%80%9Ctin
yint%E2%80%9D-field-in-most-database-systems&f=false
Which of the following equipment could a pen tester use to perform shoulder surfing?
A.
Binoculars
B.
Painted ultraviolet material
C.
Microphone
D.
All the above
Binoculars
Reference:http://en.wikipedia.org/wiki/Shoulder_surfing_(computer_security)
Today, most organizations would agree that their most valuable IT assets reside within
applications and databases. Most would probably also agree that these are areasthat have
the weakest levels of security, thus making them the prime target for malicious activity from
system administrators, DBAs, contractors, consultants, partners, and customers.
Which of the following flaws refers to an application using poorlywritten encryption code to
securely encrypt and store sensitive data in the database and allows an attacker to steal or
modify weakly protected data such as credit card numbers, SSNs, and other authentication
credentials?
A.
SSI injection attack
B.
Insecure cryptographic storage attack
C.
Hidden field manipulation attack
D.
Man-in-the-Middle attack
Insecure cryptographic storage attack
Rules of Engagement (ROE) document provides certain rights and restriction to the test
team for performing the test and helps testers to overcome legal, federal, and policy-related
restrictions to use different penetration testing tools and techniques.
What is the last step in preparinga Rules of Engagement (ROE) document?
A.
Conduct a brainstorming session with top management and technical teams
B.
Decide the desired depth for penetration testing
C.
Conduct a brainstorming session with top management and technical teams
D.
Have pre-contract discussions with different pen-testers
Conduct a brainstorming session with top management and technical teams
Page 2 out of 40 Pages |
Previous |