Correct Answer
verified
View Answer
Multiple Choice
A) ad squatting
B) clickjacking
C) malvertising
D) ad spoofing
Correct Answer
verified
Multiple Choice
A) pointer hack
B) DNS spoofing
C) clickjacking
D) domain hijacking
Correct Answer
verified
Multiple Choice
A) Session replay
B) Session spoofing
C) Session hijacking
D) Session blocking
Correct Answer
verified
Multiple Choice
A) The website must accept user input while validating it and use that input in a response.
B) The website must accept user input without validating it and use that input in a response.
C) The website must not accept user input without validating it and use that input in a response.
D) The website must accept user input while validating it and omit that input in a response.
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) resource request
B) zone sharing
C) zone transfer
D) zone removal
Correct Answer
verified
Multiple Choice
A) DNS poisoning
B) Phishing
C) DNS marking
D) DNS overloading
Correct Answer
verified
Multiple Choice
A) whatever%20 AND 1=(SELECT COUNT(*) FROM tabname) ;--
B) whatever' AND 1=(SELECT COUNT(*) FROM tabname) ;--
C) whatever;AND 1=(SELECT COUNT(*) FROM tabname) ;--
D) whatever%;AND 1=(SELECT COUNT(*) FROM tabname) ;--
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) replay
B) hijacking
C) denial
D) buffer overflow
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) HTTP
B) NSDB
C) URNS
D) DNS
Correct Answer
verified
Showing 1 - 20 of 50
Related Exams