MultipleChoice
In the context of Windows Security, what is a 'null' user?
OptionsMultipleChoice
Choose one of the following pseudo codes to describe this statement:
"If we have written 200 characters to the buffer variable, the stack should stop because it cannot hold any more data."
OptionsMultipleChoice
What will the following command produce on a website's login page if executed successfully? SELECT email, passwd, login_id, full_name FROM members WHERE email = 'someone@somewhere.com'; DROP TABLE members; --'
OptionsMultipleChoice
What is the outcome of the comm''nc -l -p 2222 | nc 10.1.0.43 1234"?
OptionsMultipleChoice
What is the main difference between a ''Normal'' SQL Injection and a ''Blind'' SQL Injection vulnerability?
OptionsMultipleChoice
What does the term ''Ethical Hacking'' mean?
OptionsMultipleChoice
To what does ''message repudiation'' refer to what concept in the realm of email security?
OptionsMultipleChoice
Eve is spending her day scanning the library computers. She notices that Alice is using a computer whose port 445 is active and listening. Eve uses the ENUM tool to enumerate Alice machine. From the command prompt, she types the following command.
For /f "tokens=1 %%a in (hackfile.txt) do net use * \\10.1.2.3\c$ /user:"Administrator" %%a
What is Eve trying to do?
OptionsMultipleChoice
What file system vulnerability does the following command take advantage of?
type c:\anyfile.exe > c:\winnt\system32\calc.exe:anyfile.exe
OptionsMultipleChoice
Exhibit:
ettercap --NCLzs --quiet
What does the command in the exhibit do in ''Ettercap''?
Options