Topic 1: Volume A
What does FIN in TCP flag define?
A.
Used to abort a TCP connection abruptly
B.
Used to close a TCP connection
C.
Used to acknowledge receipt of a previous packet or transmission
D.
Used to indicate the beginning of a TCP connection
Used to close a TCP connection
What is the problem with this ASP script (login.asp)?
A.
The ASP script is vulnerable to Cross Site Scripting attack
B.
The ASP script is vulnerable to Session Splice attack
C.
The ASP script is vulnerable to XSS attack
D.
The ASP script is vulnerable to SQL Injection attack
The ASP script is vulnerable to SQL Injection attack
Jimmy, an attacker, knows that he can take advantage of poorly designed input validation
routines to create or alter SQL commands to gain access to private data or execute
commands in the database. What technique does Jimmy use to compromise a database?
A.
Jimmy can submit user input that executes an operating system command to
compromise a target system
B.
Jimmy can gain control of system to flood the target system with requests, preventing
legitimate users from gaining access
C.
Jimmy can utilize an incorrect configuration that leads to access with higher-than
expected privilege of the database
D.
Jimmy can utilize this particular database threat that is an SQL injection technique to
penetrate a target system
Jimmy can utilize this particular database threat that is an SQL injection technique to
penetrate a target system
Neil is a network administrator working in Istanbul. Neil wants to setup a protocol analyzer
on his network that will receive a copy of every packet that passes through the main office
switch. What type of port will Neil need to setup in order to accomplish this?
A.
Neil will have to configure a Bridged port that will copy all packets to the protocol
analyzer.
B.
Neil will need to setup SPAN port that will copy all network traffic to the protocol
analyzer.
C.
He will have to setup an Ether channel port to get a copy of all network traffic to the
analyzer.
D.
He should setup a MODS port which will copy all network traffic.
Neil will need to setup SPAN port that will copy all network traffic to the protocol
analyzer.
Choose one of the following pseudo codes to describe this statement:
"If we have written 200 characters to the buffer variable, the stack should stop because it
cannot hold any more data."
A.
If (I > 200) then exit (1)
B.
If (I < 200) then exit (1)
C.
If (I <= 200) then exit (1)
D.
If (I >= 200) then exit (1)
If (I >= 200) then exit (1)
Page 1 out of 175 Pages |