- (Topic 1)
Attackers can manipulate variables that reference files with "dot-dot-slash (./)" sequences and their variations such as http://www.juggyDoy.corn/GET/process.php./././././././././etc/passwd.
Identify the attack referred.
Correct Answer:
A
- (Topic 1)
Billy, a computer forensics expert, has recovered a large number of DBX files during forensic investigation of a laptop. Which of the following email clients he can use to analyze the DBX files?
Correct Answer:
B
- (Topic 3)
In a FAT32 system, a 123 KB file will use how many sectors?
Correct Answer:
E
If you assume that we are using 512 bytes sectors, then 123x1024/512 = 246 sectors would be needed.
- (Topic 2)
When using an iPod and the host computer is running Windows, what file system will be used?
Correct Answer:
D
- (Topic 3)
Why is it a good idea to perform a penetration test from the inside?
Correct Answer:
C