Question 21
A regional bank hires your company to perform a security assessment on their network after a recent data breach. The attacker was able to steal financial data from the bank by compromising only a single server.
Based on this information, what should be one of your key recommendations to the bank?
Based on this information, what should be one of your key recommendations to the bank?
Question 22
You are looking for SQL injection vulnerability by sending a special character to web applications. Which of
the following is the most useful for quick validation?
the following is the most useful for quick validation?
Question 23
Which of the following types of jailbreaking allows user-level access but does not allow iboot-level access?
Question 24
Windows file servers commonly hold sensitive files, databases, passwords and more.
Which of the following choices would be a common vulnerability that usually exposes them?
Which of the following choices would be a common vulnerability that usually exposes them?
Question 25
Port scanning can be used as part of a technical assessment to determine network vulnerabilities. The TCP XMAS scan is used to identify listening ports on the targeted system.
If a scanned port is open, what happens?
If a scanned port is open, what happens?
