Question 73

- (Topic 4)
Which of the following syntaxes is the correct syntax for the master.dbo.sp_makewebtask procedure?

Correct Answer:B

Question 74

- (Topic 2)
What happens when you scan a broadcast IP address of a network?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:AB

Question 75

- (Topic 2)
You work as a Network Penetration tester in the Secure Inc. Your company takes the projects to test the security of various companies. Recently, Secure Inc. has assigned you a project to test the security of a Web site. You go to the Web site login page and you run the following SQL query:
SELECT email, passwd, login_id, full_name
FROM members
WHERE email = 'attacker@somehwere.com'; DROP TABLE members; --'
What task will the above SQL query perform?

Correct Answer:B

Question 76

- (Topic 4)
Which of the following Trojans does not use TCP protocol?

Correct Answer:C

Question 77

- (Topic 2)
Adam works as a professional Computer Hacking Forensic Investigator. He wants to investigate a suspicious email that is sent using a Microsoft Exchange server. Which of the following files will he review to accomplish the task?
Each correct answer represents a part of the solution. Choose all that apply.

Correct Answer:ACD

Question 78

- (Topic 2)
Which of the following tasks can be performed by using netcat utility? Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:ABC

START GPEN EXAM