MultipleChoice
In the field of cryptanalysis, what is meant by a ''rubber-hose' attack?
OptionsMultipleChoice
How can you determine if an LM hash you extracted contains a password that is less than 8 characters long?
OptionsMultipleChoice
What is the main difference between a ''Normal'' SQL Injection and a ''Blind'' SQL Injection vulnerability?
OptionsMultipleChoice
What is the outcome of the comm''nc -l -p 2222 | nc 10.1.0.43 1234"?
OptionsMultipleChoice
While using your bank's online servicing you notice the following string in the URL bar: ''http://www.MyPersonalBank.com/account?id=368940911028389&Damount=10980&Camount=21''
You observe that if you modify the Damount & Camount values and submit the request, that data on the web page reflect the changes.
Which type of vulnerability is present on this site?
OptionsMultipleChoice
In Risk Management, how is the term "likelihood" related to the concept of "threat?"
OptionsMultipleChoice
The "black box testing" methodology enforces which kind of restriction?
OptionsMultipleChoice
What is the most common method to exploit the ''Bash Bug'' or ''ShellShock" vulnerability?
OptionsMultipleChoice
You're doing an internal security audit and you want to find out what ports are open on all the servers. What is the best way to find out?
OptionsMultipleChoice
Which of the following is a restriction being enforced in ''white box testing?''
Options