In which of the following exploits does an attacker insert malicious coding into a link that appears to be from a trustworthy source?
Cross site scripting
Command injection
Path traversal attacks
Buffer overflow
Which command is used to take java core dump?
kill -3
kill -6
kill -9
kill -t
How many MQ servers are assigned to each AppServer?
1
2
3
4
What is the impact if Autonomy Autoindexer process goes down?
Won't able to access VCM Tool
Job management Console down
Search option in the VCM tool will be impacted
All the above
What would be admin console port number for cell UP06 in NGI?
25975
25976
25981
25980
Which is the command to display Qmanager status?
mqs
dspmqs
dspmq
dspmqcsv
What is the impact if DSS database goes down
Authorization impacted
Authentication impacted
Billing period data unavailable
alert info unavailable
What is CAS?
Credit Authentication System
Credit Analyzer System
Credit Authorization System
Commulative Analysis Store
Name the attack: Technique used to access files and directories stored outside web root folder
Insecure file upload
Path Traversal
Brute forcing
Universal PDF XSS
Cookie value gets submitted during POST submit of HTML FORM
True
False
May be
Never