If a web application sends HTTP cookies as its method for transmitting session tokens, it may be vulnerable which of the
following attacks?
A.
Parameter tampering Attack
B.
Sql injection attack
C.
Session Hijacking
D.
Cross-site request attack
Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM file on a computer. Where
should Harold navigate on the computer to find the file?
A.
%systemroot%\LSA
B.
%systemroot%\repair
C.
%systemroot%\system32\drivers\etc
D.
%systemroot%\system32\LSA
Transmission Control Protocol (TCP) is a connection-oriented four layer protocol. It is responsible for breaking
messages into segments, re-assembling them at the destination station, and re-sending. Which one of the following
protocols does not use the TCP?
A.
Reverse Address Resolution Protocol (RARP)
B.
HTTP (Hypertext Transfer Protocol)
C.
SMTP (Simple Mail Transfer Protocol)
D.
Telnet
Harold is a web designer who has completed a website for ghttech.net. As part of the maintenance agreement he signed
with the client, Harold is performing research online and seeing how much exposure the site has received so far. Harold
navigates to google.com and types in the following search.
link:www.ghttech.net
What will this search produce?
A.
All sites that link to ghttech.net
B.
Sites that contain the code: link:www.ghttech.net
C.
All sites that ghttech.net links to
D.
All search engines that link to .net domains
Which one of the following 802.11 types uses either FHSS or DSSS for modulation?
A.
802.11b
B.
802.11a
C.
802.11n
D.
802.11-Legacy
Page 2 out of 41 Pages |
Previous |