- (Topic 4)
What does TCSEC stand for?
Correct Answer:A
- (Topic 3)
Network mapping provides a security testing team with a blueprint of the organization. Which of the following steps is NOT a part of manual network mapping?
Correct Answer:C
- (Topic 2)
You run the following PHP script:
What is the use of the mysql_real_escape_string() function in the above script. Each correct answer represents a complete solution. Choose all that apply
Correct Answer:AD
- (Topic 4)
John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks?
Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:ACD
CORRECT TEXT - (Topic 2)
Write the appropriate attack name to fill in the blank.
In a _____________ DoS attack, the attacker sends a spoofed TCP SYN packet in which the IP address of the target is filled in both the source and destination fields.
Correct Answer:land