Question 51

You are responsible for security at a company that uses a lot of Web applications. You are most concerned about flaws
in those applications allowing some attacker to get into your network. What method would be best for finding such
flaws?
  • Question 52

    Peter works as a Network Administrator for the PassGuide Inc. The company has a Windows-based network. All client computers run the Windows XP operating system. The employees of the company complain that suddenly all of the client computers have started working slowly. Peter finds that a malicious hacker is attempting to slow down the computers by flooding the network with a large number of requests.
    Which of the following attacks is being implemented by the malicious hacker?
  • Question 53

    Which of the following types of attacks is the result of vulnerabilities in a program due to poor programming techniques?
  • Question 54

    Which of the following types of scan does not open a full TCP connection?
  • Question 55

    Against which of the following does SSH provide protection?
    Each correct answer represents a complete solution. Choose two.