An Internet-accessible database server was found with the following ports open: 22, 53, 110, 1433, and 3389. Which of the following would be the BEST hardening technique to secure the server?
Which of the following BEST protects against a rainbow table attack?
D18912E1457D5D1DDCBD40AB3BF70D5D
Which of the following actions BEST matches a script kiddie's threat actor?
A penetration tester identifies prebuilt exploit code containing Windows imports for VirtualAllocEx and LoadLibraryA functions. Which of the following techniques is the exploit code using?
A software developer wants to test the code of an application for vulnerabilities. Which of the following
processes should the software developer perform?
A penetration tester is testing a web application and is logged in as a lower-privileged user. The tester runs
arbitrary JavaScript within an application, which sends an XMLHttpRequest, resulting in exploiting features to
which only an administrator should have access. Which of the following controls would BEST mitigate the
vulnerability?
A penetration tester is checking a script to determine why some basic math errors are persisting. The expected result was the program outputting “Trueâ€.
Given the output from the console above, which of the following explains how to correct the errors in the script? (Choose two.)
A recent vulnerability scan of all web servers in an environment offers the following results:
Taking a risk-based approach, which of the following is the BEST order to approach remediation based on exposure?