Multiple Choice
Gary is using an email system that allows web based access and is popular among employees of the company he is attacking. He is testing this system to see if there is a way to gain access to other users accounts. He signs up for an account and begins to use it. He notices in the URL that information about his account name is present:
Http://mail.exampleco.com/inbox.aspx?lang=en&mailbox=Gary+Tennenbaum
He replaces his name with someone else's name in the target company that he gathered from a job posting site. What attack is he attempting?
A) URL obfuscation attack
B) Directory traversal attack
C) Query string parameter manipulation attack
D) A path string attack
Correct Answer:

Verified
Correct Answer:
Verified
Q29: Which of the following types of hosts
Q30: our employer has asked you to perform
Q31: Hosts can often be attacked in layers.
Q32: If a White Hat researcher discovers a
Q33: Which of the following (choose two) acts
Q35: Once efforts to setup blacklists were created
Q36: Which of the following protects the rights
Q37: What are the 6 principles of social
Q38: Which of the following is considered to
Q39: Which of the following statements is the