Ryan, a malicious hacker submits Cross-Site Scripting (XSS) exploit code to the Website of Internet forum for online discussion. When a user visits the infected Web page, code gets automatically executed and Ryan can easily perform acts like account hijacking, history theft etc. Which of the following types of Cross-Site Scripting attack Ryan intends to do?
Which of the following sectors on a hard disk contains codes that the computer uses to start the system?
Which of the following Linux/UNIX commands is used to delete files permanently so that the files cannot be recovered?
Which of the following is the unspecified address in IPv6?
Which of the following ports is used by e-mail clients to send request to connect to the server?
Which of the following processes is used to convert plain text into cipher text?
Which of the following are the two different file formats in which Microsoft Outlook saves e-mail messages based on system configuration?
Each correct answer represents a complete solution. Choose two.
Which of the following classes refers to the fire involving electricity?
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. The network contains a Windows Server 2008 Core computer.
You want to install the DNS server role on the Windows Server 2008 Core computer. Which of the following commands will you use to accomplish the task?
Which of the following switches is used with Pslist command on the command line to show the statistics for all active threads on the system, grouping these threads with their owning process?
Which of the following types of write blocker device uses one interface for one side and a different one for the other?
What is the maximum size of an IP datagram for Ethernet?
Which of the following groups provides tools and creates procedures for testing and validating computer forensic software?
Which of the following is an expression of interference that triggers a false positive signal during an intrusion detection process performed by IDS?
Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2000 domainbased network. Mark wants to block all NNTP traffic between the network and the Internet. How will he configure the network?