Daily Multiple Choice Test

On conviction on indictment, what is the maximum prison sentence for a breach of Section 2 of the CMA
5 years
2 years
12 years
10 years
5 years
Which of the following are most vulnerable to injection attacks?
SQL queries based on user input
Registry Keys
Network Communications
Session IDs
SQL queries based on user input
In which of the following exploits does an attacker add SQL code to a Web form input box to gain access to resources or make changes to data?
SQL injection
Cross-Site Scripting
command injection
buffer overflow
SQL injection
What service operates on TCP port 25
SMTP
SNMP
SVG
VNC
SMTP
Which common tool can be used to crack WPA keys
aircrack-ng
airodump-ng
airmon-ng
aireplay-ng
aircrack-ng
which command can be used to identify currently logged in users
finger
ls
uid
sudo
finger
A fully established UDP handshake consists of which of the following?
There is no handshake
SYN | SYN | SYN-ACK
SYN | ACK | SYN | ACK
SYN | SYN-ACK | ACK
There is no handshake
In what type of attack does an intruder manipulate a URL in such a way that the Web server executes or reveals the contents of a file anywhere on the server, including those lying outside the document root directory?
path traversal attacks
Cross-Site Scripting
command injection
SQL injection
path traversal attacks
For a computer with an IP address of 143.18.12.84/16, what would the broadcast address of the network be
143.18.255.255
143.255.255.255
143.18.12.255
255.255.0.0
143.18.255.255
What characters may be used to trigger an SQL error
1
Your Score
Score Label
Score Summary