1. Right Answer: A
Explanation: De-escalation is the need to communicate with the client for eliminating issues and crises that arise during a penetration test.
2. Right Answer: C
Explanation: The protocol WEP, Wired Equivalent Protocol, was part of the original wireless communication standard;802.11, but now it is considered as a broken encryption algorithm.
3. Right Answer: C
Explanation: In this type of attack, the attacker attempts using trial and error method to access restricted directories using dots and slash sequences. By accessing the directories outside the root directory, the attacker reveals sensitive information about the system.
4. Right Answer: B
Explanation: Application Administrator is responsible for the management and configuration required for the web application. It ensures the availability and high performance of the web application.
5. Right Answer: B
Explanation: An attacker accessing the web application by using low privilege account, escalates the privileges to access sensitive information. Different techniques are used such as URL, POST data, Query string, cookies, parameter tampering, HTTP header, et to escalate privileges.
Leave a comment