Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

You run the following PHP script:

<?php $name = mysql_real_escape_string($_POST["name"]);

$password = mysql_real_escape_string($_POST["password"]); ?>

What is the use of the mysql_real_escape_string() function in the above script.

Each correct answer represents a complete solution. Choose all that apply.

A.

It can be used to mitigate a cross site scripting attack.

B.

It can be used as a countermeasure against a SQL injection attack.

C.

It escapes all special characters from strings $_POST["name"] and $_POST["password"] except ' and ".

D.

It escapes all special characters from strings $_POST["name"] and $_POST["password"].

Which of the following applications is NOT used for passive OS fingerprinting?

A.

Networkminer

B.

Satori

C.

p0f

D.

Nmap

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are working as a root user on the Linux operating system. Your company is facing an IP spoofing attack.

Which of the following tools will you use to get an alert saying that an upcoming IP packet is being spoofed?

A.

Despoof

B.

Dsniff

C.

ethereal

D.

Neotrace

Which of the following statements about smurf is true?

A.

It is a UDP attack that involves spoofing and flooding.

B.

It is an ICMP attack that involves spoofing and flooding.

C.

It is an attack with IP fragments that cannot be reassembled.

D.

It is a denial of service (DoS) attack that leaves TCP ports open.

Which of the following is used to determine the operating system on the remote computer in a network environment?

A.

Spoofing

B.

Reconnaissance

C.

OS Fingerprinting

D.

Social engineering

Which of the following protocols uses only User Datagram Protocol (UDP)?

A.

POP3

B.

FTP

C.

ICMP

D.

TFTP

Which of the following tools is used for port scanning?

A.

NSLOOKUP

B.

NETSH

C.

Nmap

D.

L0phtcrack

Peter works as a Network Administrator for the PassGuide Inc. The company has a Windows-based network. All client computers run the Windows XP operating system. The employees of the company complain that suddenly all of the client computers have started working slowly. Peter finds that a malicious hacker is attempting to slow down the computers by flooding the network with a large number of requests. Which of the following attacks is being implemented by the malicious hacker?

A.

SQL injection attack

B.

Denial-of-Service (DoS) attack

C.

Man-in-the-middle attack

D.

Buffer overflow attack