单选题 When reviewing the security logs, the password shown for an Administrative login event was 'OR ' '1'='1' --. This is an example of which of The following kinds of attack?在查看安全日志时,为管理登录事件显示的密码为“OR”“1”=“1”--。这是以下哪一种攻击的一个例子?
相关试题
单选题 A system has been scanned for vulnerabilities and has been Found to contain a number of communication ports that have been opened without Authority. To which of the following might this system have been subjected?系统已扫描漏洞,发现包含一些未经授权打开的通信端口。这个系统可能受到以下哪一种影响?
单选题 A network administrator is designing a new datacenter in a Different region that will need toCommunicate to the old datacenter with a Secure connection. Which of the following access methodsWould provide the BEST Security for this new datacenter?网络管理员正在不同的区域设计一个新的数据中心,该数据中心需要通过安全连接与旧的数据中心进行通信。以下哪一个访问 258IT 认证保证,简单的方法!方法将为这个新的数据中心提供最好的安全性吗?
单选题 What Is a risk of using commercial off-the-shelf (COTS) Products?使用商用现成的(COTS)产品的风险是什么?
单选题 A security professional determines that a number of Outsourcing contracts inherited from aPrevious merger do NOT adhere to the Current security requirements. Which of the following BESTMinimizes the risk of This happening again?安全专业人员确定从以前的合并中继承来的一些外包合同不符合当前的安全要求。以下哪一种最好能将这种情况再次发生的风险降到最低?
单选题 What is the MOST appropriate hierarchy of documents when Implementing a security program?在实现安全程序时,最合适的文档层次结构是什么?
单选题 In a financial institution, who has the responsibility for Assigning the classification to a piece of information?在金融机构中,谁负责对一条信息进行分类?
单选题 A large university needs to enable student access to University resources from their homes. Which of the following provides the BEST Option for low maintenance and ease of deployment?一所大型大学需要让学生从家中获得大学资源。以下哪一项提供了低维护和易于部署的最佳选项?
单选题 Which one of the following can be used to detect an anomaly in a system by keeping track of the state of files that do NOT Normally change?通过跟踪正常情况下不会更改的文件的状态,可以使用以下哪一种方法来检测系统中的异常情况?