Which of the following is an automated password cracking technique that uses a combination of uppercase and lowercase letters, 0-9 numbers, and special characters?
A company website was hacked via the following SQL query:
email, passwd, login_id, full_name FROM members
WHERE email = ''attacker@somewhere.com''; DROP TABLE members; --''
Which of the following did the hackers perform?
A security investigator has detected an unauthorized insider reviewing files containing company secrets.
Which of the following commands could the investigator use to determine which files have been opened by this user?
When tracing an attack to the point of origin, which of the following items is critical data to map layer 2 switching?
The host that owns the IP address sends an ARP reply message with its physical address. Each host machine maintains a table, called ARP cache, used to convert MAC addresses to IP addresses. Since ARP is a stateless protocol, every time a host gets an ARP reply from another host, even though it has not sent an ARP request for that reply, it accepts that ARP entry and updates its ARP cache. The process of updating a target host's ARP cache with a forged entry is referred to as poisoning.
Which of the following, when exposed together, constitutes PII? (Choose two.)