Sample Questions
Q) Which of the following methods of cracking the password used when the attacker has any information about the password?
a) Hybrid Attack
b) Dictionary Attack
c) attack syllable d) attack on the basis of the rules
e) None
Q) Which of the following is a notification application that returned the web-based application that helps an attacker to guess the correct username?
a) incorrect username or password
b) Username not found
c)incorrect password
d) Incorrect username or password
e) None
Q) Pen testers have extracted the database name using a blind SQL injection. Now he begins to check a table within the database using the following query and find the table: What is the name of the table? a) CTS
b) QRT
c) EMP
d) ABC
e) None
Q) When the network startup and IDS to close the connection, which is used IDS?
a) passive IDS
b) active IDS
c) progressive IDS
d) NIPS
e) None