Certified Ethical Hacker 312-50v10 – Question050

Code injection is a form of attack in which a malicious user:


A.
Inserts text into a data field that gets interpreted as code
B. Gets the server to execute arbitrary code using a buffer overflow
C. Inserts additional code into the JavaScript running in the browser
D. Gains access to the codebase on the server and inserts new code

Correct Answer: A

Certified Ethical Hacker 312-50v10 – Question045

Bob, your senior colleague, has sent you a mail regarding aa deal with one of the clients. You are requested to accept the offer and you oblige.
After 2 days, Bob denies that he had ever sent a mail.
What do you want to know to prove yourself that it was Bob who had send a mail?


A.
Confidentiality
B. Integrity
C. Non-Repudiation
D. Authentication

Correct Answer: C

Certified Ethical Hacker 312-50v10 – Question043

The following is part of a log file taken from the machine on the network with the IP address of 192.168.0.110:

What type of activity has been logged?


A.
Teardrop attack targeting 192.168.0.110
B. Denial of service attack targeting 192.168.0.105
C. Port scan targeting 192.168.0.110
D. Port scan targeting 192.168.0.105

Correct Answer: C