312-50v13 문제 306
Ricardo has discovered the username for an application in his targets environment. As he has a limited amount of time, he decides to attempt to use a list of common passwords he found on the Internet. He compiles them into a list and then feeds that list as an argument into his password-cracking application, what type of attack is Ricardo performing?
312-50v13 문제 307
An experienced cyber attacker has created a fake Linkedin profile, successfully impersonating a high-ranking official from a well-established company, to execute a social engineering attack. The attacker then connected with other employees within the organization, receiving invitations to exclusive corporate events and gaining access to proprietary project details shared within the network. What advanced social engineering technique has the attacker primarily used to exploit the system and what is the most likely immediate threat to the organization?
312-50v13 문제 308
은행은 주택 담보 대출과 관련된 민감한 개인정보를 저장하고 처리합니다. 그러나 시스템에 감사 기능이 활성화된 적이 없습니다. 은행이 감사 기능을 활성화하기 전에 취해야 할 첫 번째 단계는 무엇입니까?
312-50v13 문제 309
SQL 삽입 취약점을 확인하기 위해 애플리케이션을 테스트한다고 가정해 보겠습니다. 백엔드 데이터베이스가 Microsoft SQL Server 기반임을 알고 있습니다. 로그인/비밀번호 양식에 다음 자격 증명을 입력합니다.
사용자 이름: attack' 또는 1=1 -
비밀번호: 123456
위의 자격 증명을 기준으로, 실제로 SQL 주입 취약점이 있는 경우 서버에서 다음 SQL 명령 중 어떤 명령이 실행될 것으로 예상합니까?
사용자 이름: attack' 또는 1=1 -
비밀번호: 123456
위의 자격 증명을 기준으로, 실제로 SQL 주입 취약점이 있는 경우 서버에서 다음 SQL 명령 중 어떤 명령이 실행될 것으로 예상합니까?
312-50v13 문제 310
Joel, a professional hacker, targeted a company and identified the types of websites frequently visited by its employees. Using this information, he searched for possible loopholes in these websites and injected a malicious script that can redirect users from the web page and download malware onto a victim's machine.
Joel waits for the victim to access the infected web application so as to compromise the victim's machine.
Which of the following techniques is used by Joel in the above scenario?
Joel waits for the victim to access the infected web application so as to compromise the victim's machine.
Which of the following techniques is used by Joel in the above scenario?