256 bits
40 bits
Question 15
When searching for searching for URLs that allow submission of data to a back-end database. The
attacker looks for HTML pages that use ___ methods to submit data to the database.
POST or GET
SQL
HTTP
SEND or GET
Question 16
Using the ___ function an attacker can inject SQL statements into MYSQL without using double quotes.
Benchmark
Sleep
SQLEXC

Char
Question 17
This Blue tooth attack occurs because an oversized ping packet:
Blue Cracking
Blue Snarfing
Bluesmacking
Blue Bugging
Question 18
Which of the following are part of the aircrack-ng suite? (Choose all that apply)
Airodump-ng
Aircrack-ng
Airdecap-ng
Packetforge-ng
Question 19
SQL Databases include (Choose all that apply):

Microsoft SQL
Oracle
MS Access
My SQL
Question 20
What is the major difference between SQL injection attack and a blind SQL injection attack?
Informational error messages not displayed in blind SQL injection attacks
Informational error messages are displayed in blind SQL injection attacks
Informational error messages not displayed in SQL injection attacks
Blind SQL injection attacks are faster than SQL injection attacks

You've reached the end of your free preview.
Want to read all 8 pages?
- Summer '15
- Wired Equivalent Privacy, Blind SQL Injection, SQL injection attacks