What type of attack occurs when an attacker
uses a web application to send malicious code, generally in the form of a
browser side script, to a third party?
Protocol manipulation
Cross-site scripting
Sniffing
Spoofing
EXPLANATION
A cross-site scripting attack occurs when an attacker uses a
web application to send malicious code, generally in the form of
a browser side script, to a third party.
Power over Ethernet describes any of several
standardized systems which pass electric power along with data on
twisted pair Ethernet cabling. How much power does the updated IEEE
802.3at-2009 PoE standard also known as PoE+ or PoE plus provide?
Which of the following is not a part of 3-2-1 backup strategy?
Different vendor
Different copy
Different location
Different media
EXPLANATION
The 3-2-1 backup strategy, also known as the Rule of Three,
says that you should have at least 3 different copies of the data on at
least 2 different types of media in at least 1 different location.
In Active Directory what is the attribute name for someone's Assistant in the Exchange Global Address List
msAssistantExch
msExchAssistantName
msExchAssistant
ExchAssistantName
EXPLANATION
This attribute in Active Directory is usually set using
ADSIEdit. There are ways to set this programmatically using C# and
PowerShell. This attribute sets the assistant's name in the GAL which
allows for identifying a PA / Secretary for a (usually) senior member of
staff in an organisation
Which of the following RegEx character sets
does the '\w' meta-character most closely represent in Perl-compatible
Regular Expression implementations?
[a-zA-Z]
[a-zA-Z0-9]
[a-zA-Z_]
[a-zA-Z0-9_]
EXPLANATION
The "word" meta-character \w in RegEx will match the full
alpha-numeric range, basically the full alphabet as well as number
characters, and includes underscores.
Note that it
matches more alphabet characters than the standard a through z: pretty
much any alphabet character, such as 'ñ', also match.
In a Windows security log, which of the following logon type codes is produced by someone logging on from a local keyboard?
10
3
2
5
EXPLANATION
The correct answer is 2. While Event ID 4624 shows a
successful logon, you need to look at the event code to see the specific
nature of that logon. You’ll see type 2 logons when a user attempts to
log on at the local keyboard and screen, whether with a domain account
or a local account from the computer’s local SAM. Code 10 is for remote
access, code 3 is from the network (for things such as accessing
shares), and code 5 is used when a service starts up. For more
information, See the source