Identify the attack when an attacker by several trial and error can read the contents of a password file present in the restricted etc folder just by manipulating the URL in the browser as shown:

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:August 1, 2021
  • Reading time:1 mins read

Identify the attack when an attacker by several trial and error can read the contents of a password file present in the restricted etc folder just by manipulating the URL…

Continue ReadingIdentify the attack when an attacker by several trial and error can read the contents of a password file present in the restricted etc folder just by manipulating the URL in the browser as shown:

Which cross-site scripting attack is sometimes called persistent?

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:August 1, 2021
  • Reading time:2 mins read

Which cross-site scripting attack is sometimes called persistent? reflected stored directed DOM based Explanation: A stored XSS attack is one in which the injected script is stored in the server…

Continue ReadingWhich cross-site scripting attack is sometimes called persistent?

Ray is a SOC analyst in a company named Queens Tech. One Day, Queens Tech is affected by a DoS/DDoS attack. For the containment of this incident, Ray and his team are trying to provide additional bandwidth to the network devices and increasing the capacity of the servers. What is Ray and his team doing?

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:August 1, 2021
  • Reading time:1 mins read

Ray is a SOC analyst in a company named Queens Tech. One Day, Queens Tech is affected by a DoS/DDoS attack. For the containment of this incident, Ray and his…

Continue ReadingRay is a SOC analyst in a company named Queens Tech. One Day, Queens Tech is affected by a DoS/DDoS attack. For the containment of this incident, Ray and his team are trying to provide additional bandwidth to the network devices and increasing the capacity of the servers. What is Ray and his team doing?

Which operation has as its goal the identification of all available services on a device?

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:August 1, 2021
  • Reading time:2 mins read

Which operation has as its goal the identification of all available services on a device? port scan banner grabbing OS fingerprinting ping scan Explanation: A port scan identifies the open…

Continue ReadingWhich operation has as its goal the identification of all available services on a device?

What occurs when you allow specific executable files while denying all others?

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:August 1, 2021
  • Reading time:2 mins read

What occurs when you allow specific executable files while denying all others? whitelisting blacklisting greylisting redlisting Explanation: When you whitelisting, you are creating a list of allowed applications while denying…

Continue ReadingWhat occurs when you allow specific executable files while denying all others?

Which of the following directory will contain logs related to printer access?

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:August 1, 2021
  • Reading time:1 mins read

Which of the following directory will contain logs related to printer access? /var/log/cups/Printer_log file /var/log/cups/access_log file /var/log/cups/accesslog file /var/log/cups/Printeraccess_log file

Continue ReadingWhich of the following directory will contain logs related to printer access?

Which one of the following is the correct flow for Setting Up a Computer Forensics Lab?

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:August 1, 2021
  • Reading time:1 mins read

Which one of the following is the correct flow for Setting Up a Computer Forensics Lab? Planning and budgeting –> Physical location and structural design considerations –> Work area considerations…

Continue ReadingWhich one of the following is the correct flow for Setting Up a Computer Forensics Lab?

Which of the following occurs at Layer 7 of the OSI model?

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:August 1, 2021
  • Reading time:2 mins read

Which of the following occurs at Layer 7 of the OSI model? VLANs Packet filtering Stateful firewall operation Deep packet inspection Explanation: Deep packet inspection is performed by application firewalls,…

Continue ReadingWhich of the following occurs at Layer 7 of the OSI model?

According to the forensics investigation process, what is the next step carried out right after collecting the evidence?

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:August 1, 2021
  • Reading time:1 mins read

According to the forensics investigation process, what is the next step carried out right after collecting the evidence? Create a Chain of Custody Document Send it to the nearby police…

Continue ReadingAccording to the forensics investigation process, what is the next step carried out right after collecting the evidence?