Filters
Question type

Study Flashcards

Although traditional network security devices can block traditional network attacks, they cannot always block Web application attacks.

A) True
B) False

Correct Answer

verifed

verified

Describe a cross-site scripting (XSS) attack.

Correct Answer

verifed

verified

Unlike other Web application attacks, a ...

View Answer

When DNS servers exchange information among themselves it is known as a ____.


A) resource request
B) zone disarticulation
C) zone transfer
D) zone removal

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

List three of the most common Web application attacks.

Correct Answer

verifed

verified

The most common Web applicatio...

View Answer

The expression ____ up one directory level.


A) ;/traverses
B) ./traverses
C) %20/traverses
D) ../ traverses

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Describe the two types of privilege escalation.

Correct Answer

verifed

verified

There are two types of privilege escalat...

View Answer

Match each term with the correct statement below.

Premises
Created from the Web site that a user is currently viewing
Privileges that are granted to users to access hardware and software resources
Exploits previously unknown vulnerabilities so victims have no time to prepare or defend against the attacks.
Takes advantage of vulnerability in the Web application program or the Web server software so that a user can move from the root directory to other restricted directories
Targets vulnerabilities in client applications that interact with a compromised server or process malicious data
The ability to move to another directory could allow an unauthorized user to view confidential files or even enter commands to execute on a server
An attack involving using a third party to gain access rights.
Injects scripts into a Web application server that will then direct attacks at clients
Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining
Responses
Cross-site scripting (XSS) attack
Zero day attack
Directory traversal attack
Client-side attack
Transitive access
First-party cookie
Command injection
Privilege escalation
Access rights

Correct Answer

Created from the Web site that a user is currently viewing
Privileges that are granted to users to access hardware and software resources
Exploits previously unknown vulnerabilities so victims have no time to prepare or defend against the attacks.
Takes advantage of vulnerability in the Web application program or the Web server software so that a user can move from the root directory to other restricted directories
Targets vulnerabilities in client applications that interact with a compromised server or process malicious data
The ability to move to another directory could allow an unauthorized user to view confidential files or even enter commands to execute on a server
An attack involving using a third party to gain access rights.
Injects scripts into a Web application server that will then direct attacks at clients
Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining

Because the XSS is a widely known attack, the number of Web sites that are vulnerable is very small.

A) True
B) False

Correct Answer

verifed

verified

A ____ attack is similar to a passive man-in-the-middle attack.


A) replay
B) hijacking
C) denial
D) buffer overflow

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

A

A client-side attack that results in a user's computer becoming compromised just by viewing a Web page and not even clicking any content is known as a ____.


A) buffer overflow
B) drive-by-download
C) denial of service
D) stack underflow

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

B

Web application attacks are considered ____ attacks.


A) client-side
B) hybrid
C) server-side.
D) relationship

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Describe how to harden a Web server.

Correct Answer

verifed

verified

Enhancing the security of the Web server...

View Answer

HTML is a markup language that uses specific ____ embedded in brackets.


A) blocks
B) marks
C) taps
D) tags

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

D

Describe a drive-by-download attack.

Correct Answer

verifed

verified

Attackers first identify a vulnerable We...

View Answer

ARP poisoning is successful because there are few authentication procedures to verify ARP requests and replies.

A) True
B) False

Correct Answer

verifed

verified

Users who access a Web server are usually restricted to the ____ directory.


A) top
B) base
C) root
D) tap

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

Because of the minor role it plays, DNS is never the focus of attacks.

A) True
B) False

Correct Answer

verifed

verified

The SQL injection statement ____ discovers the name of a table.


A) whatever%20 AND 1=(SELECT COUNT(*) FROM tabname) ; --
B) whatever' AND 1=(SELECT COUNT(*) FROM tabname) ; --
C) whatever; AND 1=(SELECT COUNT(*) FROM tabname) ; --
D) whatever%; AND 1=(SELECT COUNT(*) FROM tabname) ; --

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Describe the differences between XML and HTML.

Correct Answer

verifed

verified

There are several significant difference...

View Answer

____ is designed to display data, with the primary focus on how the data looks.


A) XML
B) HTML
C) SGML
D) ISL

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Showing 1 - 20 of 42

Related Exams

Show Answer