256 bits 40 bits Question 15 When searching for searching for URLs that allow submission of data to a back-end database. The attacker looks for HTML pages that use ___ methods to submit data to the database. POST or GET SQL HTTP SEND or GET Question 16 Using the ___ function an attacker can inject SQL statements into MYSQL without using double quotes. Benchmark Sleep SQLEXC
Char Question 17 This Blue tooth attack occurs because an oversized ping packet: Blue Cracking Blue Snarfing Bluesmacking Blue Bugging Question 18 Which of the following are part of the aircrack-ng suite? (Choose all that apply) Airodump-ng Aircrack-ng Airdecap-ng Packetforge-ng Question 19 SQL Databases include (Choose all that apply):
Microsoft SQL Oracle MS Access My SQL Question 20 What is the major difference between SQL injection attack and a blind SQL injection attack? Informational error messages not displayed in blind SQL injection attacks Informational error messages are displayed in blind SQL injection attacks Informational error messages not displayed in SQL injection attacks Blind SQL injection attacks are faster than SQL injection attacks
You've reached the end of your free preview.
Want to read all 8 pages?
- Summer '15
- Wired Equivalent Privacy, Blind SQL Injection, SQL injection attacks