IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Ethical HackerA company uses the Microsoft Active Directory service to manage the authentication and authorization of employee workstations. The company hires a cybersecurity professional to perform compliance penetration testing. Which type of penetration testing can be used to verify the proper configuration of the Active Directory service?ITExamAnswers asked 10 months ago • Ethical HackerWhich type of SQL query is in the SQL statement select * from users where user = “admin”;?ITExamAnswers asked 10 months ago • Ethical HackerAn attacker launches an SQL injection attack on a web application by trying to force the application requesting the back-end database to perform multiple SELECT queries. Which technique exploits the SQL injection vulnerability on the web application?ITExamAnswers asked 10 months ago • Ethical HackerA threat actor launches an SQL injection attack against a web site by sending multiple specific statements to the web site and reconstructing the key information the threat actor seeks. What type of SQL injection attack is the threat actor using?ITExamAnswers asked 10 months ago • Ethical HackerWhich statement describes an example of an out-of-band SQL injection attack?ITExamAnswers asked 10 months ago • Ethical HackerWhich component in the statement below is most likely user input on a web form?ITExamAnswers asked 10 months ago • Ethical HackerWhich international organization is dedicated to educating industry professionals, creating tools, and evangelizing best practices for securing web applications and underlying systems?ITExamAnswers asked 10 months ago • Ethical HackerWhich two attributes can be set in a web application cookie to indicate it is a persistent cookie? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerWhat is the best mitigation approach against session fixation attacks?ITExamAnswers asked 10 months ago • Ethical HackerA user is using an online shopping website to order laptop computers. Which mechanism is used by the shopping site to securely maintain user authentication during shopping?ITExamAnswers asked 10 months ago • Ethical HackerWhy should application developers change the session ID names used by common web application development frameworks?ITExamAnswers asked 10 months ago • Ethical HackerWhich function is provided by HTTP 2.0 to improve performance over HTTP 1.1?ITExamAnswers asked 10 months ago • Ethical HackerMatch the elements in the URL ftp://xyz-company.com:2457/support/file;id=65?name=intro&r=true to the description.ITExamAnswers asked 10 months ago • Ethical HackerMatch the HTTP status code contained in a web server response to the description.ITExamAnswers asked 10 months ago • Ethical HackerWhich two functions are provided by a web proxy device? (Choose two.)ITExamAnswers asked 10 months ago • Ethical Hacker