Question 26

Which common source of vulnerability should be addressed to BEST mitigate against URL redirection attacks?
  • Question 27

    Which of the following technologies would reduce the risk of a successful SQL injection attack?
  • Question 28

    After a hacker obtained a shell on a Linux box, the hacker then sends the exfiltrated data via Domain Name System (DNS). This is an example of which type of data exfiltration?
  • Question 29

    After a security breach, a security consultant is hired to perform a vulnerability assessment for a company's web application. Which of the following tools would the consultant use?
  • Question 30

    While reviewing some audit logs, an analyst has identified consistent modifications to the sshd_config file for an organization's server. The analyst would like to investigate and compare contents of the current file with archived versions of files that are saved weekly. Which of the following tools will be MOST effective during the investigation?