00:00

QUESTION 6

John works as a Penetration Tester in a security service providing firm named you-are-secure Inc. Recently, John's company has got a project to test the security of a promotional Website www.missatlanta.com and assigned the pen-testing work to John. When John is performing penetration testing, he inserts the following script in the search box at the company home page:

After pressing the search button, a pop-up box appears on his screen with the text - "Hi, John." Which of the following attacks can be performed on the Web site tested by john while considering the above scenario?

Correct Answer: D

QUESTION 7

Which of the following statements are true about firewalking?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer: ABC

QUESTION 8

Which of the following is a technique for creating Internet maps?
Each correct answer represents a complete solution. Choose two.

Correct Answer: AB

QUESTION 9

Which of the following is the most common vulnerability that can affect desktop applications written in native code?

Correct Answer: D

QUESTION 10

John works as a Network Administrator for We-are-secure Inc. He finds that TCP port 7597 of the Weare- secure server is open. He suspects that it may be open due to a Trojan installed on the server. He presents a report to the company describing the symptoms of the Trojan. A summary of the report is given below:
Once this Trojan has been installed on the computer, it searches Notpad.exe, renames it Note.com, and then copies itself to the computer as Notepad.exe. Each time Notepad.exe is executed, the Trojan executes and calls the original Notepad to avoid being noticed.
Which of the following Trojans has the symptoms as the one described above?

Correct Answer: B