Question 6

SQL injection is a very popular and successful injection attack method. Identify the basic SQL injection text:
  • Question 7

    Scenario: Your corporate systems have been under constant probing and attack from foreign IP addresses for more than a week. Your security team and security infrastructure have performed well under the stress. You are confident that your defenses have held up under the test, but rumors are spreading that sensitive customer data has been stolen and is now being sold on the Internet by criminal elements.
    During your investigation of the rumored compromise you discover that data has been breached and you have discovered the repository of stolen data on a server located in a foreign country. Your team now has full access to the data on the foreign server.
    What action should you take FIRST?
  • Question 8

    According to the National Institute of Standards and Technology (NIST) SP 800-40, which of the following considerations are MOST important when creating a vulnerability management program?
  • Question 9

    Which of the following is the MOST important reason to measure the effectiveness of an Information Security Management System (ISMS)?
  • Question 10

    According to ISO 27001, of the steps for establishing an Information Security Governance program listed below, which comes first?