Question 156

Following a data compromise, a cybersecurity analyst noticed the following executed query:
SELECT * from Users WHERE name = rick OR 1=1
Which of the following attacks occurred, and which of the following technical security controls would BEST reduce the risk of future impact from this attack? (Select TWO).
  • Question 157

    A database administrator contacts a security administrator to request firewall changes for a connection to a new internal application.
    The security administrator notices that the new application uses a port typically monopolized by a virus.
    The security administrator denies the request and suggests a new port or service be used to complete the application's task.
    Which of the following is the security administrator practicing in this example?
  • Question 158

    A university wants to increase the security posture of its network by implementing vulnerability scans of both centrally managed and student/employee laptops. The solution should be able to scale, provide minimum false positives and high accuracy of results, and be centrally managed through an enterprise console. Which of the following scanning topologies is BEST suited for this environment?
  • Question 159

    A penetration tester is preparing for an audit of critical systems that may impact the security of the environment. This includes the external perimeter and the internal perimeter of the environment. During which of the following processes is this type of information normally gathered?
  • Question 160

    A cybersecurity analyst was asked to discover the hardware address of 30 networked assets. From a
    command line, which of the following tools would be used to provide ARP scanning and reflects the MOST
    efficient method for accomplishing the task?