Attackers cannot use IP address spoofing in port scanning attack packets.
Following someone through a secure door for access without u…
Following someone through a secure door for access without using an authorized ID card or pass code is called ________. (Choose the most specific answer.)
A man in the middle attack is an attempt to store more data…
A man in the middle attack is an attempt to store more data into a memory variable than that variable accepts. Basically it writes too much data into an application’s memory and causes the application to crash.
________ occurs when companies believe they have good securi…
________ occurs when companies believe they have good security because they are using proprietary ciphers that hackers do not know.
Rainbow tables contain lists of pre-computed password hashes…
Rainbow tables contain lists of pre-computed password hashes that are indexed to expedite the password cracking process.
Restoration of data files from tape ________.
Restoration of data files from tape ________.
It is not possible for a vulnerability to fall within more t…
It is not possible for a vulnerability to fall within more than one of OWASP’s top ten categories.
____________________________ vulnerability testing occurs wh…
____________________________ vulnerability testing occurs when the code is isolated and disconnected from interfacing systems.
____________ is a type of spear-phishing that targets execut…
____________ is a type of spear-phishing that targets executives and high-profile targets.
It is very important for testers to get permission before ru…
It is very important for testers to get permission before running a password cracking program on their company’s computers to check for weak passwords even if such testing is in their job definitions.