Which of the following web-application security risks are part of the OWASP Top 10 v2017? (Choose two.)
A01-Injection
A02-Broken Authentication
A03-Sensitive Data Exposure
A04-XXE
A05-Broken Access Control
A06-Security Misconfiguration
A07-XSS
A08-Insecure Deserialization
A09-Using Components with Known Vulnerabilities
A10-Insufficient Logging & Monitoring
Cross-site scripting (XSS) and injection flaws are two of the web-application security risks that are part of the OWASP Top 10 v2017 list. XSS is a type of attack that injects malicious scripts into web pages or applications that are viewed by other users, resulting in compromised sessions, stolen cookies, or redirected browsers. Injection flaws are a type of attack that exploits a vulnerability in an application's data input or output, such as SQL injection, command injection, or LDAP injection, resulting in unauthorized access, data loss, or remote code execution. The other options are not part of the OWASP Top 10 v2017 list.
A company becomes concerned when the security alarms are triggered during a penetration test. Which of the following should the company do NEXT?
Deconflicting with the penetration tester is the best thing to do next after the security alarms are triggered during a penetration test, as it will help determine whether the alarm was caused by the tester's activity or by an actual threat. Deconflicting is the process of communicating and coordinating with other parties involved in a penetration testing engagement, such as security teams, network administrators, or emergency contacts, to avoid confusion or interference.
A penetration tester discovered a vulnerability that has the following CVEs:
Which of the following CVEs should be remediated first?
A penetration tester wants to crack MD5 hashes more quickly. The tester knows that the first part of the password is Winter followed by four digits and a special character at the end. Which of the following commands should the tester use?
In a standard engagement, a post-report document is provided outside of the report. This document:
* Does not contain specific findings
* Exposes vulnerabilities
* Can be shared publicly with outside parties that do not have an in-depth understanding about the client's network
Which of the following documents is described?
Beatriz
2 days agoNathan
7 days agoAnnmarie
1 months agoKassandra
1 months agoLera
2 months agoArt
2 months agoMaryanne
2 months agoNobuko
3 months agoLashawna
3 months agoRosalind
3 months agoChristiane
3 months agoHuey
4 months agoJamal
4 months agoErin
4 months agoRebbecca
4 months agoMarcelle
5 months agoTerrilyn
5 months agoAsuncion
5 months agoTamar
5 months agoAllene
5 months agoElin
6 months agoPhuong
6 months agoKati
6 months agoOren
6 months agoNathalie
7 months agoIzetta
7 months agoElroy
7 months agoRonald
7 months agoElenore
7 months agoKing
8 months agoMarya
8 months agoTemeka
8 months agoMichal
8 months agoLizbeth
9 months agoFrancene
10 months agoArlene
10 months agoAnastacia
11 months ago