Given below is a regex signature used by security professionals for detecting an XSS attack:
/((%3C)|<)[^\n]+((%3E)|>)/i
Which of the following types of XSS attack does the above regex expression detect?
Which of the following tools helps forensic experts analyze user activity in the Microsoft Edge browser?
Philip, a forensic officer, was tasked with investigating a crime scene. In this process, he created bit-by-bit copies of the suspect drive and retrieved all the disk images using the dd command.
Which of the following data acquisition image formats is extracted by Philip in the above scenario?
Alice and John are close college friends. Alice frequently sends emails to John attaching her pics with friends. One day, Alice sent an email to John describing all the details related to the final year project without specifying the actual purpose. John missed the message as he frequently receives emails from her and did not arrive for a project seminar.
Which of the following email fields could Alice have used in the above scenario to highlight the importance of the email?