Question 56

Louis, a professional hacker, had used specialized tools or search engines to encrypt all his browsing activity and navigate anonymously to obtain sensitive/hidden information about official government or federal databases. After gathering the information, he successfully performed an attack on the target government organization without being traced.
Which of the following techniques is described in the above scenario?
  • Question 57

    SQL injection (SQLi) attacks attempt to inject SQL syntax into web requests, which may Bypass authentication and allow attackers to access and/or modify data attached to a web application.
    Which of the following SQLI types leverages a database server's ability to make DNS requests to pass data to an attacker?
  • Question 58

    This is an attack that takes advantage of a web site vulnerability in which the site displays content that includes un-sanitized user-provided data.

    What is this attack?
  • Question 59

    Clark, a professional hacker, attempted to perform a Btlejacking attack using an automated tool, Btlejack, and hardware tool, micro:bit. This attack allowed Clark to hijack, read, and export sensitive information shared between connected devices. To perform this attack, Clark executed various btlejack commands. Which of the following commands was used by Clark to hijack the connections?
  • Question 60

    Bob, a system administrator at TPNQM SA, concluded one day that a DMZ is not needed if he properly configures the firewall to allow access just to servers/ports, which can have direct internet access, and block the access to workstations.
    Bob also concluded that DMZ makes sense just when a stateful firewall is available, which is not the case of TPNQM SA.
    In this context, what can you say?