GCFA Exam Question 31

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare- secure.com. He enters a single quote in the input field of the login page of the We-are-secure Web site and receives the following error message:
Microsoft OLE DB Provider for ODBC Drivers error '0x80040E14'
This error message shows that the We-are-secure Website is vulnerable to __________.
  • GCFA Exam Question 32

    Which of the following types of evidence proves or disproves a specific act through oral testimony based on information gathered through the witness's five senses?
  • GCFA Exam Question 33

    Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?
  • GCFA Exam Question 34

    Your network has a Windows 2000 Server computer with FAT file system, shared by several users.
    This system stores sensitive data. You decide to encrypt this data to protect it from unauthorized access. You want to accomplish the following goals:
    * Data should be secure and encrypted.
    * Administrative efforts should be minimum.
    * You should have the ability to recover encrypted files in case the file owner leaves the company.
    * Other permissions on encrypted files should be unaffected.
    * File-level security is required on the disk where data is stored.
    * Encrypting or decrypting of files should not be the responsibility of the file owner.
    You take the following steps to accomplish these goals :
    * Convert the FAT file system to Windows 2000 NTFS file system.
    * Use Encrypting File System (EFS) to encrypt data.
    Which of the following goals will you be able to accomplish?
    Each correct answer represents a complete solution. Choose all that apply.
  • GCFA Exam Question 35

    Which of the following types of attack can guess a hashed password?