Question 31

A common concern with poorly written web applications is that they can allow an attacker to:
  • Question 32

    A web server in a financial institution that has been compromised using a super-user account has been isolated, and proper forensic processes have been followed. The next step should be to:
  • Question 33

    Which of the following vulnerabilities presents the GREATEST risk of external hackers gaining access to the corporate network?
  • Question 34

    A company has a network of branch offices with local file/print and mail servers; each branch individually contracts a hot site. Which of the following would be the GRF.ATEST weakness in recovery capability?
  • Question 35

    An outcome of effective security governance is: