Which of the following techniques is employed by Susan?

Susan, a software developer, wants her web API to update other applications with the latest information. For this purpose, she uses a user-defined HTTP tailback or push APIs that are raised based on trigger events: when invoked, this feature supplies data to other applications so that users can instantly receive...

June 3, 2021No CommentsREAD MORE +

What hacking attack is challenge/response authentication used to prevent?

What hacking attack is challenge/response authentication used to prevent?A . Replay attacksB . Scanning attacksC . Session hijacking attacksD . Password cracking attacksView AnswerAnswer: A

June 3, 2021No CommentsREAD MORE +

Cross-site request forgery involves:

Cross-site request forgery involves:A . A request sent by a malicious user from a browser to a serverB . Modification of a request by a proxy between client and serverC . A browser making a request to a server without the user’s knowledgeD . A server making a request to...

June 3, 2021No CommentsREAD MORE +

What is this attack called?

in this attack, an adversary tricks a victim into reinstalling an already-in-use key. This is achieved by manipulating and replaying cryptographic handshake messages. When the victim reinstall the key, associated parameters such as the incremental transmit packet number and receive packet number are reset to their initial values. What is...

June 3, 2021No CommentsREAD MORE +

What most likely happened?

While browsing his Facebook teed, Matt sees a picture one of his friends posted with the caption. "Learn more about your friends!", as well as a number of personal questions. Matt is suspicious and texts his friend, who confirms that he did indeed post it. With assurance that the post...

June 3, 2021No CommentsREAD MORE +

What kind of Web application vulnerability likely exists in their software?

A company’s Web development team has become aware of a certain type of security vulnerability in their Web software. To mitigate the possibility of this vulnerability being exploited, the team wants to modify the software requirements to disallow users from entering HTML as input into their Web application. What kind...

June 2, 2021No CommentsREAD MORE +

What is the attack performed on Don in the above scenario?

Don, a student, came across a gaming app in a third-party app store and Installed it. Subsequently, all the legitimate apps in his smartphone were replaced by deceptive applications that appeared legitimate. He also received many advertisements on his smartphone after Installing the app. What is the attack performed on...

June 2, 2021No CommentsREAD MORE +

In this context, what can you say?

Bob, a system administrator at TPNQM SA, concluded one day that a DMZ is not needed if he properly configures the firewall to allow access just to servers/ports, which can have direct internet access, and block the access to workstations. Bob also concluded that DMZ makes sense just when a...

June 2, 2021No CommentsREAD MORE +

Which of the following Linux commands will resolve a domain name into IP address?

Which of the following Linux commands will resolve a domain name into IP address?A . >host-t a hackeddomain.comB . >host-t ns hackeddomain.comC . >host -t soa hackeddomain.comD . >host -t AXFR hackeddomain.comView AnswerAnswer: A

June 2, 2021No CommentsREAD MORE +

Which of the following attacks is performed by Clark in above scenario?

Steven connected his iPhone to a public computer that had been infected by Clark, an attacker. After establishing the connection with the public computer, Steven enabled iTunes WI-FI sync on the computer so that the device could continue communication with that computer even after being physically disconnected. Now, Clark gains...

June 2, 2021No CommentsREAD MORE +