Which tool is used to automate SQL injections and exploit a database by forcing a given web application to connect to another database controlled by a hacker?
The following is a sample of output from a penetration tester's machine targeting a machine with the IP address of 192.168.1.106:
What is most likely taking place?
Which type of access control is used on a router or firewall to limit network activity?
When an alert rule is matched in a network-based IDS like snort, the IDS does which of the following?
What is the broadcast address for the subnet 190.86.168.0/22?
A penetration tester is hired to do a risk assessment of a company's DMZ. The rules of engagement states that the penetration test be done from an external IP address with no prior knowledge of the internal IT systems. What kind of test is being performed?
Which of the following is a component of a risk assessment?
Which of the following is a hardware requirement that either an IDS/IPS system or a proxy server must have in order to properly function?
While conducting a penetration test, the tester determines that there is a firewall between the tester's machine and the target machine. The firewall is only monitoring TCP handshaking of packets at the session layer of the OSI model. Which type of firewall is the tester trying to traverse?
What is the name of the international standard that establishes a baseline level of confidence in the security functionality of IT products by providing a set of requirements for evaluation?
A consultant has been hired by the V.P. of a large financial organization to assess the company's security posture. During the security testing, the consultant comes across child pornography on the V.P.'s computer. What is the consultant's obligation to the financial organization?
Some passwords are stored using specialized encryption algorithms known as hashes. Why is this an appropriate method?
Which vital role does the U.S. Computer Security Incident Response Team (CSIRT) provide?
For messages sent through an insecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. While using a digital signature, the message digest is encrypted with which key?
Which of the following can take an arbitrary length of input and produce a message digest output of 160 bit?
PDF + Testing Engine
|
---|
$57.75 |
Testing Engine
|
---|
$43.75 |
PDF (Q&A)
|
---|
$36.75 |
GAQM Free Exams |
---|
![]() |