Free 412-79V9 Exam Braindumps (page: 5)

Page 5 of 91

New flaws in web application security measures are constantly being researched, both by
hackers and by security professionals. Most of these flaws affect all dynamic web applications
whilst others are dependent on specific application technologies. In both cases, one may
observe how the evolution and refinement of web technologies also brings about new exploits
which compromise sensitive databases, provide access to theoretically secure networks, and
pose a threat to the daily operation of online businesses.
What is the biggest threat to Web 2.0 technologies?

A. SQL Injection Attacks
B. Service Level Configuration Attacks
C. Inside Attacks
D. URL Tampering Attacks

Answer(s): A
QUESTION: 7
In which of the following firewalls are the incoming or outgoing packets blocked from accessing
services for which there is no proxy?

A. Circuit level firewalls
B. Packet filters firewalls
C. Stateful multilayer inspection firewalls
D. Application level firewalls

Answer(s): D
Reference:
http://www.vicomsoft.com/learning-center/firewalls/
QUESTION: 8
Which one of the following Snort logger mode commands is associated to run a binary log file
through Snort in sniffer mode to dump the packets to the screen?

A. ./snort -dvr packet.log icmp

https://Free-Braindumps.com




Post your Comments and Discuss EC-Council 412-79V9 exam prep with other Community members: