Question 21

Which of the following attack can be eradicated by disabling of "allow_url_fopen and allow_url_include" in the php.ini file?
  • Question 22

    Which of the following can help you eliminate the burden of investigating false positives?
  • Question 23

    Which of the following tool is used to recover from web application incident?
  • Question 24

    Mike is an incident handler for PNP Infosystems Inc. One day, there was a ticket raised regarding a critical incident and Mike was assigned to handle the incident. During the process of incident handling, at one stage, he has performed incident analysis and validation to check whether the incident is a true incident or a false positive.
    Identify the stage in which he is currently in.
  • Question 25

    Which of the following is a default directory in a Mac OS X that stores security-related logs?