Which of the following techniques is employed by Susan?
Susan, a software developer, wants her web API to update other applications with the latest information. For this purpose, she uses a user-defined HTTP tailback or push APIs that are raised based on trigger events: when invoked, this feature supplies data to other applications so that users can instantly receive...
What hacking attack is challenge/response authentication used to prevent?
What hacking attack is challenge/response authentication used to prevent?A . Replay attacksB . Scanning attacksC . Session hijacking attacksD . Password cracking attacksView AnswerAnswer: A
Cross-site request forgery involves:
Cross-site request forgery involves:A . A request sent by a malicious user from a browser to a serverB . Modification of a request by a proxy between client and serverC . A browser making a request to a server without the user’s knowledgeD . A server making a request to...
What is this attack called?
in this attack, an adversary tricks a victim into reinstalling an already-in-use key. This is achieved by manipulating and replaying cryptographic handshake messages. When the victim reinstall the key, associated parameters such as the incremental transmit packet number and receive packet number are reset to their initial values. What is...
What most likely happened?
While browsing his Facebook teed, Matt sees a picture one of his friends posted with the caption. "Learn more about your friends!", as well as a number of personal questions. Matt is suspicious and texts his friend, who confirms that he did indeed post it. With assurance that the post...
What kind of Web application vulnerability likely exists in their software?
A company’s Web development team has become aware of a certain type of security vulnerability in their Web software. To mitigate the possibility of this vulnerability being exploited, the team wants to modify the software requirements to disallow users from entering HTML as input into their Web application. What kind...
What is the attack performed on Don in the above scenario?
Don, a student, came across a gaming app in a third-party app store and Installed it. Subsequently, all the legitimate apps in his smartphone were replaced by deceptive applications that appeared legitimate. He also received many advertisements on his smartphone after Installing the app. What is the attack performed on...
In this context, what can you say?
Bob, a system administrator at TPNQM SA, concluded one day that a DMZ is not needed if he properly configures the firewall to allow access just to servers/ports, which can have direct internet access, and block the access to workstations. Bob also concluded that DMZ makes sense just when a...
Which of the following Linux commands will resolve a domain name into IP address?
Which of the following Linux commands will resolve a domain name into IP address?A . >host-t a hackeddomain.comB . >host-t ns hackeddomain.comC . >host -t soa hackeddomain.comD . >host -t AXFR hackeddomain.comView AnswerAnswer: A
Which of the following attacks is performed by Clark in above scenario?
Steven connected his iPhone to a public computer that had been infected by Clark, an attacker. After establishing the connection with the public computer, Steven enabled iTunes WI-FI sync on the computer so that the device could continue communication with that computer even after being physically disconnected. Now, Clark gains...