Question 41

An attacker, in an attempt to exploit the vulnerability in the dynamically generated welcome page, inserted code at the end of the company's URL as follows:
http://technosoft.com.com/<script>alert("WARNING: The application has encountered an error");</script>.
Identify the attack demonstrated in the above scenario.
  • Question 42

    Jason, a SOC Analyst with Maximus Tech, was investigating Cisco ASA Firewall logs and came across the following log entry:
    May 06 2018 21:27:27 asa 1: %ASA -5 - 11008: User 'enable_15' executed the 'configure term' command What does the security level in the above log indicates?
  • Question 43

    Which of the following attack can be eradicated by filtering improper XML syntax?
  • Question 44

    According to the Risk Matrix table, what will be the risk level when the probability of an attack is very high, and the impact of that attack is major?
    NOTE: It is mandatory to answer the question before proceeding to the next one.
  • Question 45

    Which of the following factors determine the choice of SIEM architecture?