Question 21

A regional bank hires your company to perform a security assessment on their network after a recent data breach. The attacker was able to steal financial data from the bank by compromising only a single server.
Based on this information, what should be one of your key recommendations to the bank?
  • Question 22

    You are looking for SQL injection vulnerability by sending a special character to web applications. Which of
    the following is the most useful for quick validation?
  • Question 23

    Which of the following types of jailbreaking allows user-level access but does not allow iboot-level access?
  • Question 24

    Windows file servers commonly hold sensitive files, databases, passwords and more.
    Which of the following choices would be a common vulnerability that usually exposes them?
  • Question 25

    Port scanning can be used as part of a technical assessment to determine network vulnerabilities. The TCP XMAS scan is used to identify listening ports on the targeted system.
    If a scanned port is open, what happens?