The "white box testing" methodology enforces what kind of restriction?
Only the internal operation of a system is known to the tester.
The internal operation of a system is completely known to the tester.
The internal operation of a system is only partly accessible to the tester.
Only the external operation of a system is accessible to the tester.
Correct answer: B
Question 2
Identify the web application attack where the attackers exploit vulnerabilities in dynamically generated web pages to inject client-side script into web pages viewed by other users.
SQL injection attack
Cross-Site Scripting (XSS)
LDAP Injection attack
Cross-Site Request Forgery (CSRF)
Correct answer: B
Question 3
This tool is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the PTW attack, thus making the attack much faster compared to other WEP cracking tools.