Q1. An attacker injects malicious query strings in user input fields to bypass web service authentication mechanisms and to access back-end databases. Which of the following attacks is this?
A.Frame Injection Attack
B. LDAP Injection Attack
C. XPath Injection Attack
D. SOAP Injection Attack
Correct Answer: D
Q2. You just passed your ECSA exam and are about to start your first consulting job running security audits for a financial institution in Los Angeles. The IT manager of the company you will be working for tries to see if you remember your ECSA class. He asks about the methodology you will be using to test the company's network. How would you answer?
A.IBM Methodology
B. LPT Methodology
C. Google Methodology
D. Microsoft Methodology
Correct Answer: B
$ 39
Reviews
There are no reviews yet.