1/14
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which of the following techniques is used by an attacker to gain unauthorized access to a target network and remain undetected for a long period of time?
Advanced Persistent Threat
What is the TCP IP based protocol for exchanging management information between devices connected to a network?
SNMP
In which of the following types of injection attacks does an attacker exploit vulnerable form inputs, inject HTML code into a webpage, and change the website appearance?
HTML Injection
Which of the following is the most effective technique in identifying vulnerabilities or flaws in the web page code?
Code Analysis
Ensuring session tokens are not reused helps to prevent this attack
Session fixation
During a SQL Injection attack these characters can be used to trick the program into discarding SQL code fragments
comment characters
During this attack sensitive data is improperly obtained from the database
Information Disclosure
Choose all correct answers SQL Injection is a result of
Poor Programming Technique, Carefully crafted user input, lack of user input validation
Which of the following characters is most helpful to an attacker during an SQL injection attack?
Dashes
Which of the following is not a SQL injection countermeasure
Reduce complexity by granting maximum rights to database accounts.
Which of the following techniques is used to compromise session IDs, with an attacker intruding into an existing connection between systems a attempting to intercept the messages being transmitted?
Man in the middle attack
Which of the following is a technique used by an attacker masquerading as a trusted host to conceal their identity for hijacking browsers or gaining unauthorized access to a network?
IP Addresses spoofing
It may be possible to delete tables or change the database structure during a SQL Injection attack.
True
Predictable table names may make a SQL Injection attack easier to accomplish.
True (PT)
Which of the following is not a valid SQL command
Change