Which of the following scanning tools is specifically designed to find potential exploits in Microsoft Windows products?
On a Linux device, which of the following commands will start the Nessus client in the background so that the Nessus server can be configured?
Which set of access control solutions implements two-factor authentication?
A security analyst in an insurance company is assigned to test a new web application that will be used by clients to help them choose and apply for an insurance plan. The analyst discovers that the application is developed in ASP scripting language and it uses MSSQL as a database backend. The analyst locates the application's search form and introduces the following code in the search input field:
When the analyst submits the form, the browser returns a pop-up window that says "Vulnerable".
Which web applications vulnerability did the analyst discover?