MultipleChoice
Company XYZ has asked you to assess the security of their perimeter email gateway. From your office in New York, you craft a specially formatted email message and send it across the Internet to an employee of Company XYZ. The employee of Company XYZ is aware of your test.
Your email message looks like this:
From: jim_miller@companyxyz.com
To: michelle_saunders@companyxyz.com
Subject: Test message
Date: 4/3/2017 14:37
The employee of Company XYZ receives your email message. This proves that Company XYZ's email gateway doesn't prevent what?
OptionsMultipleChoice
In the field of cryptanalysis, what is meant by a ''rubber-hose' attack?
OptionsMultipleChoice
How can you determine if an LM hash you extracted contains a password that is less than 8 characters long?
OptionsMultipleChoice
What is the main difference between a ''Normal'' SQL Injection and a ''Blind'' SQL Injection vulnerability?
OptionsMultipleChoice
What is the outcome of the comm''nc -l -p 2222 | nc 10.1.0.43 1234"?
OptionsMultipleChoice
While using your bank's online servicing you notice the following string in the URL bar: ''http://www.MyPersonalBank.com/account?id=368940911028389&Damount=10980&Camount=21''
You observe that if you modify the Damount & Camount values and submit the request, that data on the web page reflect the changes.
Which type of vulnerability is present on this site?
OptionsMultipleChoice
In Risk Management, how is the term "likelihood" related to the concept of "threat?"
OptionsMultipleChoice
The "black box testing" methodology enforces which kind of restriction?
OptionsMultipleChoice
What is the most common method to exploit the ''Bash Bug'' or ''ShellShock" vulnerability?
OptionsMultipleChoice
You're doing an internal security audit and you want to find out what ports are open on all the servers. What is the best way to find out?
Options