单选题 When reviewing the security logs, the password shown for an Administrative login event was 'OR ' '1'='1' --. This is an example of which of The following kinds of attack?在查看安全日志时,为管理登录事件显示的密码为“OR”“1”=“1”--。这是以下哪一种攻击的一个例子?

A、 Brute Force Attack蛮力攻击
B、 Structured Query Language (SQL) Injection结构化查询语言(SQL)注入
C、 Cross-Site Scripting (XSS)跨站脚本(XSS)
D、 Rainbow Table Attack102 / 彩虹表攻击
下载APP答题
由4l***uh提供 分享 举报 纠错

相关试题

单选题 A system has been scanned for vulnerabilities and has been Found to contain a number of communication ports that have been opened without Authority. To which of the following might this system have been subjected?系统已扫描漏洞,发现包含一些未经授权打开的通信端口。这个系统可能受到以下哪一种影响?

A、 Trojan Horse特洛伊木马
B、 Denial of Service (DoS)拒绝服务 (DoS)
C、 Spoofing欺骗
D、 Man-in-the-Middle (MITM)中间人 (MITM)

单选题 A network administrator is designing a new datacenter in a Different region that will need toCommunicate to the old datacenter with a Secure connection. Which of the following access methodsWould provide the BEST Security for this new datacenter?网络管理员正在不同的区域设计一个新的数据中心,该数据中心需要通过安全连接与旧的数据中心进行通信。以下哪一个访问 258IT 认证保证,简单的方法!方法将为这个新的数据中心提供最好的安全性吗?

A、 Virtual network computing虚拟网络计算
B、 Secure Socket Shell安全套接字外壳
C、 in-band connection带内连接
D、 Site-to-site VPN点到点 VPN

单选题 What Is a risk of using commercial off-the-shelf (COTS) Products?使用商用现成的(COTS)产品的风险是什么?

A、 COTS Products may NOT map directly to an organization's security requirements.COTS 产品可能无法直接映射到组织的安全要求
B、 COTS products are typically more Expensive than developing software in-house.COTS 产品通常比内部开发软件更昂贵
C、 Cost to implement COTS products is Difficult to predict.实施 COTS 产品的成本难以预测
D、 Vendors are often hesitant to share Their source code.供应商经常犹豫是否要分享他们的源代码

单选题 A security professional determines that a number of Outsourcing contracts inherited from aPrevious merger do NOT adhere to the Current security requirements. Which of the following BESTMinimizes the risk of This happening again?安全专业人员确定从以前的合并中继承来的一些外包合同不符合当前的安全要求。以下哪一种最好能将这种情况再次发生的风险降到最低?

A、 Define additional security Controls directly after the merger 在合并后直接定义其他安全控制
B、 Include a procurement officer in the Merger team 在合并团队中包括一名采购官
C、 Verify all contracts before a merger Occurs 在合并发生之前验证所有合同
D、 Assign a Compliancy officer to review the merger conditions 指派一名合规官审查合并条件

单选题 What is the MOST appropriate hierarchy of documents when Implementing a security program?在实现安全程序时,最合适的文档层次结构是什么?

A、 Organization principle, Policy, standard, guideline组织原则、政策、标准、指南
B、 Policy, organization principle, Standard, guideline政策、组织原则、标准、指南
C、 Standard, Policy, organization principle, guideline标准、政策、组织原则、指南
D、 Organization principle, guideline, Policy, standard组织原则、指导方针、政策、标准

单选题 In a financial institution, who has the responsibility for Assigning the classification to a piece of information?在金融机构中,谁负责对一条信息进行分类?

A、 Chief Financial Officer (CFO)首席财务官(首席财务官)
B、 Chief Information Security Officer (CISO)首席信息安全官(CISO)
C、 Originator Or nominated owner of the information该信息的发起人或指定的所有者
D、 Department head responsible for Ensuring the protection of the information负责确保信息保护的部门负责人

单选题 A large university needs to enable student access to University resources from their homes. Which of the following provides the BEST Option for low maintenance and ease of deployment?一所大型大学需要让学生从家中获得大学资源。以下哪一项提供了低维护和易于部署的最佳选项?

A、 Provide students with Internet Protocol Security (IPSec) Virtual Private Network (VPN) client Software为学生提供互联网协议安全(IPSec)虚拟专用网络(VPN)客户端软件
B、 Use Secure Sockets Layer (SSL) VPN technology使用安全套接字层(SSL)VPN 技术
C、 Use Secure Shell (SSH) with public Private keys使用带有公钥和私钥的安全 Shell(SSH)
D、 Require students to purchase home Router capable of VPN要求学生购买能够 VPN 的家庭路由器

单选题 Which one of the following can be used to detect an anomaly in a system by keeping track of the state of files that do NOT Normally change?通过跟踪正常情况下不会更改的文件的状态,可以使用以下哪一种方法来检测系统中的异常情况?

A、 System logs系统日志
B、 Anti-spyware反间谍软件
C、 Integrity Checker完整性检查程序
D、 Firewall logs防火墙日志