On conviction on indictment, what is the maximum prison sentence for a breach of Section 2 of the CMA
5 years
Which of the following are most vulnerable to injection attacks?
SQL queries based on user input
In which of the following exploits does an attacker add SQL code to a Web form input box to gain access to resources or make changes to data?
SQL injection
What service operates on TCP port 25
SMTP
Which common tool can be used to crack WPA keys
aircrack-ng
which command can be used to identify currently logged in users
finger
A fully established UDP handshake consists of which of the following?
There is no handshake
In what type of attack does an intruder manipulate a URL in such a way that the Web server executes or reveals the contents of a file anywhere on the server, including those lying outside the document root directory?
path traversal attacks
For a computer with an IP address of 143.18.12.84/16, what would the broadcast address of the network be
143.18.255.255
What characters may be used to trigger an SQL error