CS-ETHICAL HACKING-EXAM REVIEW

Ace your homework & exams now with Quizwiz!

John built a forum-based website. He wants to save a payload in the database to affect its viewers. What attack is most likely to be used?

Stored XSS

While using Nmap to map an organization and find open ports, Tom receives RST as a response. What is the port status?

The port is closed.

A new security vulnerability in software that wasn't known before.

Zero-day

Thomas tries to change his friend's PC boot order but encounters a password request. What security solution was implemented?

BIOS password

What tool is highly effective when testing client-server transactions, can be used to manipulate captured data, and can send the data to the server?

Burp Suite

In order to crack a password on a website, Sasha did some research on the user and gathered information about him. What tool can be used to make the cracking process easier?

CUPP

Which type of On-Path attack includes the process of redirecting a domain name request to a custom phishing domain?

DNS Poisoning

What tool can be used to clone a specific website to be used in a phishing campaign?

HTTrack

What platform can help Ted perform penetration testing on a system?

MetaSploit

What can be used to prevent SQL Injection on a website?

Prepared statements

Which of the following users would you try to compromise if you could not get root access?

Any user


Related study sets

INCLINED PLANE, WEDGE, AND SCREW

View Set

Chapter 1: Introduction to Earth

View Set

Cardiac Output and Blood Pressure

View Set

Quiz 7 Chapter 21 Lab Ex 25 Resp Anatomy

View Set

CHP. 11 Classical and Keynesian Macro Analysis

View Set

T/F Chapter 7 Quiz, Chapter 8 Quiz, Chapter 9 Quiz, Chapter 10 Quiz, Chapter 11 Quiz, Chapter 12 Quiz

View Set