Which of the following is most likely to install a "backdoor" internet connection?
Trojan
Virus
Worm
Adware
Which OS listed below is specifically developed for a hackers use?
Solaris
Ubuntu
BackTrack
Windows
You have entered www.google.com in the URL and page is redirected to www.yahoo.com. In this scenario you have been _________________.
IP Spoofed
DNS Spoofed
Email Spoofed
Packet Spoofed
Hackers often gain entry to a network be pretending to be at a legitimate computer.
Phishing
Forging
ID Theft
IP Spoofing
Kevin and his friends are going through a local IT firm's garbage. Which of the following best describes this activity?
Reconnaissance
Intelligence Gathering
Social Engineering
Dumpster Diving
How to implement authentication via web.config?
Include the authentication element.
Include the authorization element.
Include the identity element.
Include the deny element.
Which of the following vulnerability can not be handled by Input Validation?
Cross site Scripting
Injection flaws
Privilege Escalation
None of the above
Which validation can be bypassed easily?
Server side Validation
Client side Validation
Both 1 and 2
Allowing user input to control paths used in file system operations may results in----
Privilege Escalations
Path traversal Attack
Cross Site Scripting
Buffer overflow
What is a Log File.
an ASCII file that contains an entry for each user
File which is created and maintained by a server of activity performed by it.
short python program that prints the list of all files inside the current directory
File which is created and maintained by the operating system