Multiple Choice
An internal penetration tester was assessing a recruiting page for potential issues before it was pushed to the production website. The penetration tester discovers an issue that must be corrected before the page goes live. The web host administrator collects the log files below and gives them to the development team so improvements can be made to the security design of the website. Which of the following types of attack vectors did the penetration tester use?
A) SQL injection
B) CSRF
C) Brute force
D) XSS
E) TOC/TOU
Correct Answer:

Verified
Correct Answer:
Verified
Q178: A company has made it a spending
Q179: An organization is moving internal core data-processing
Q180: A company is not familiar with the
Q181: Ann, a retiring employee, cleaned out her
Q182: A Chief Information Security Officer (CISO) is
Q184: Following a merger, the number of remote
Q185: A technician is validating compliance with organizational
Q186: A security architect has been assigned to
Q187: A request has been approved for a
Q188: Following a recent outage, a systems administrator