IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Ethical HackerWhich is a characteristic of a DNS poisoning attack?ITExamAnswers asked 10 months ago • Ethical HackerWhat UDP port number is used by SNMP protocol?ITExamAnswers asked 10 months ago • Ethical HackerWhat two features are present on DNS servers using BIND 9.5.0 and higher that help mitigate DNS cache poisoning attacks? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerMatch the port type and number with the respective NetBIOS protocol service.ITExamAnswers asked 10 months ago • Ethical HackerWhich NetBIOS service is used for connection-oriented communication?ITExamAnswers asked 10 months ago • Ethical HackerWhat is the best practice to mitigate the vulnerabilities from a lack of proper error handling in an application?ITExamAnswers asked 10 months ago • Ethical HackerBecause of an insecure code practice, an attacker can leverage and completely compromise an application or the underlying system. What insecure code practice enabled this catastrophic threat?ITExamAnswers asked 10 months ago • Ethical HackerAn attacker enters the following URL to exploit vulnerabilities in a web application: Which type of vulnerability did the attacker try to exploit?ITExamAnswers asked 10 months ago • Ethical HackerAfter some reconnaissance efforts, an attacker identified a web server hosted on a Linux system. The attacker then entered the URL shown below, Which type of web vulnerability is being exploited by the attacker?ITExamAnswers asked 10 months ago • Ethical HackerAccording to OWASP, which three statements are rules to prevent XSS attacks? (Choose three.)ITExamAnswers asked 10 months ago • Ethical HackerA company has hired a cybersecurity firm to assess web server security posture. To test for cross-site scripting vulnerabilities, the tester will use the string. Where would the tester use the string?ITExamAnswers asked 10 months ago • Ethical HackerAn attacker sends a request to an online university portal site with the information: Which type of vulnerability does the attacker try to exploit?ITExamAnswers asked 10 months ago • Ethical HackerAn organization has developed a network security policy stating that newly purchased routers and switches must be configured with advanced security measures before deploying them to the production network. Which threat does this policy mitigate?ITExamAnswers asked 10 months ago • Ethical HackerA web application configures client cookies with the HTTPOnly flag. What is the effect of this flag?ITExamAnswers asked 10 months ago • Ethical HackerWhat is a potentially dangerous web session management practice?ITExamAnswers asked 10 months ago • Ethical Hacker