Rainbow tables contain lists of pre-computed password hashes that are indexed to expedite the password cracking process.
Restoration of data files from tape ________.
Restoration of data files from tape ________.
It is not possible for a vulnerability to fall within more t…
It is not possible for a vulnerability to fall within more than one of OWASP’s top ten categories.
____________________________ vulnerability testing occurs wh…
____________________________ vulnerability testing occurs when the code is isolated and disconnected from interfacing systems.
____________ is a type of spear-phishing that targets execut…
____________ is a type of spear-phishing that targets executives and high-profile targets.
It is very important for testers to get permission before ru…
It is very important for testers to get permission before running a password cracking program on their company’s computers to check for weak passwords even if such testing is in their job definitions.
Confidentiality means that attackers cannot change or destro…
Confidentiality means that attackers cannot change or destroy information.
A ________ attack is when a victim is flooded with SYN packe…
A ________ attack is when a victim is flooded with SYN packets in an attempt to make many half-open TCP connections.
Employees pose an decreased risk to organizations as they of…
Employees pose an decreased risk to organizations as they often have access to sensitive parts of systems.
If an attacker takes over a firewall, he or she will be able…
If an attacker takes over a firewall, he or she will be able to ________.