An administrator is replacing a wireless router. The configuration of the old wireless router was not documented before it stopped functioning. The equipment connecting to the wireless network uses older legacy equipment that was manufactured prior to the release of …
A security administrator is performing a risk assessment on a legacy WAP with a WEP-enabled wireless infrastructure. Which of the following should be implemented to harden the infrastructure without upgrading the WAP?
Which of the following is the BEST reason to run an untested application is a sandbox?
When designing a web based client server application with single application server and database cluster backend, input validation should be performed:
n application was recently compromised after some malformed data came in via web form. Which of the following would MOST likely have prevented this?
Security analyst accesses corporate web pages and inputs random data in the forms. The response received includes the type of database used and SQL mands that the database accepts. Which of the following should the security analyst use to prevent …
Users are attempting to access a company’s website but are transparently redirected to another websites. The users confirm the URL is correct. Which of the wing would BEST prevent this issue in the future?
An in-house penetration tester is using a packet capture device to listen in on network communications. This is an example of:
Which of the following penetration testing concepts is being used when an attacker uses public Internet databases to enumerate and learn more about a target?
A Chief Information Officer (CIO) recently saw on the news that a significant security flaws exists with a specific version of a technology the company uses to support many critical application. The CIO wants to know if this reported vulnerability …