Q1. Which of the following technologies is used as mitigation to XSS attacks?
A.Intrusion prevention
B. Proxy filtering
C. Web application firewall
D. Intrusion detection
Correct Answer: C
Q2. An incident responder notices many entries in an apache access log file that contain semicolons. Which of the following attacks is MOST likely being attempted?
A.SQL injection
B. Remote file inclusion
C. Account brute force
D. Cross-site scripting
Correct Answer: A
Q3. An alert on user account activity outside of normal business hours returns Windows even IDs 540 and 4624. In which of the following locations will these events be found?
A.Application event log
B. System event log
C. Setup event log
D. Security event log
Correct Answer: D
Q4. An incident responder notices many entries in an apache access log file that contain semicolons. Which of the following attacks is MOST likely being attempted?
A.SQL injection
B. Remote file inclusion
C. Account brute force
D. Cross-site scripting
Correct Answer: A
$ 39
Reviews
There are no reviews yet.