Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What is the main purpose of a "SQL injection" attack?

A.

Accessing an organization's network.

B.

Intercepting web traffic.

C.

Exploiting a database by manipulating SQL commands.

Can all computers be hacked?

A.

Yes, all computer equipment can be hacked without any complications. B. Yes, all are hackable. C. No, only those that are not updated by security patches, both operating system and programs and exposed ports.

Do hackers only perform criminal acts?

A.

Hackers do not exist. B. YES, they are only dedicated to exploiting vulnerabilities. C. NO, there are ethical hackers who are in charge of analyzing and reporting vulnerabilities.

What is a WAF?

A.

A Web Application Form (WAF) protects printers from multiple attacks.

B.

A Web Application Functionality (WAF) protects computers from multiple attacks.

C.

A Web Application Firewall (WAF) protects the web application server from multiple attacks.

Is it important to perform pentesting to companies?

A.

YES, in order to protect the information.

B.

NO, since hackers do not exist.

C.

YES, in order to sell the information.

Can all computers be hacked?

A.

No, only computers that are not updated with security patches and have exposed ports can be hacked.

B.

Yes, all computer equipment can be hacked without any complications.

C.

Yes, all computers are hackable.

What is a security breach?

A.

A cybersecurity incident that results in unauthorized access to personal or corporate data.

B.

The hacking of the entire internet.

C.

An internet shutdown or breakup.

Which of the following is a network security protocol designed to authenticate and authorize remote users to securely access network resources?

A.

SSH (Secure Shell)

B.

FTP (File Transfer Protocol)

C.

SSL (Secure Sockets Layer)

What is a vulnerability scan?

A.

It is the process of identifying, quantifying and prioritizing vulnerabilities in computer systems.

B.

It is the process of mapping the network and nodes in a building for better distribution.

C.

It is the process of identifying and exploiting gaps no matter what.

What is a CVE?

A.

Common Non-Vulnerable Entries that list secure systems.

B.

A hacker magazine available for purchase.

C.

Common Vulnerabilities and Exposures (CVE) is a publicly available list of known computer security vulnerabilities.