GCFA Exam Question 31
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare- secure.com. He enters a single quote in the input field of the login page of the We-are-secure Web site and receives the following error message:
Microsoft OLE DB Provider for ODBC Drivers error '0x80040E14'
This error message shows that the We-are-secure Website is vulnerable to __________.
Microsoft OLE DB Provider for ODBC Drivers error '0x80040E14'
This error message shows that the We-are-secure Website is vulnerable to __________.
GCFA Exam Question 32
Which of the following types of evidence proves or disproves a specific act through oral testimony based on information gathered through the witness's five senses?
GCFA Exam Question 33
Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?
GCFA Exam Question 34
Your network has a Windows 2000 Server computer with FAT file system, shared by several users.
This system stores sensitive data. You decide to encrypt this data to protect it from unauthorized access. You want to accomplish the following goals:
* Data should be secure and encrypted.
* Administrative efforts should be minimum.
* You should have the ability to recover encrypted files in case the file owner leaves the company.
* Other permissions on encrypted files should be unaffected.
* File-level security is required on the disk where data is stored.
* Encrypting or decrypting of files should not be the responsibility of the file owner.
You take the following steps to accomplish these goals :
* Convert the FAT file system to Windows 2000 NTFS file system.
* Use Encrypting File System (EFS) to encrypt data.
Which of the following goals will you be able to accomplish?
Each correct answer represents a complete solution. Choose all that apply.
This system stores sensitive data. You decide to encrypt this data to protect it from unauthorized access. You want to accomplish the following goals:
* Data should be secure and encrypted.
* Administrative efforts should be minimum.
* You should have the ability to recover encrypted files in case the file owner leaves the company.
* Other permissions on encrypted files should be unaffected.
* File-level security is required on the disk where data is stored.
* Encrypting or decrypting of files should not be the responsibility of the file owner.
You take the following steps to accomplish these goals :
* Convert the FAT file system to Windows 2000 NTFS file system.
* Use Encrypting File System (EFS) to encrypt data.
Which of the following goals will you be able to accomplish?
Each correct answer represents a complete solution. Choose all that apply.
GCFA Exam Question 35
Which of the following types of attack can guess a hashed password?