Exam 10: Hacking Web Servers
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review49 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering48 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals50 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: the Hidden Threat59 Questions
Exam 10: Hacking Web Servers49 Questions
Exam 11: Hacking Wireless Networks50 Questions
Exam 12: Cryptography50 Questions
Exam 13: Network Protection Systems59 Questions
Select questions type
Which of the following is the interface that determines how a Web server passes data to a Web browser?
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
C
Which of the following programming languages was originally used primarily on UNIX systems,but is used more widely now on many platforms,such as Macintosh and Windows?
Free
(Multiple Choice)
5.0/5
(38)
Correct Answer:
D
Which of the following application tests analyzes a running application for vulnerabilities?
Free
(Multiple Choice)
4.8/5
(42)
Correct Answer:
C
Match each item with a statement below.
-The analysis of a running application for vulnerabilities
(Multiple Choice)
4.7/5
(31)
Match each item with a statement below.
-Open-source server-side scripting language that runs on a server and enables Web developers to create dynamic Web pages
(Multiple Choice)
5.0/5
(32)
Match each item with a statement below.
-The attacker supplies SQL commands when prompted to fill in a Web application field
(Multiple Choice)
4.7/5
(39)
Which of the following cross-site scripting vulnerabilities types relies on social engineering to trick a user into visiting a maliciously crafted link or URL?
(Multiple Choice)
4.8/5
(35)
What is the specific act of filtering,rejecting,or sanitizing a user's untrusted input before the application processes it?
(Multiple Choice)
4.8/5
(41)
Which of the following is a programming interface for connecting a Web application to a database and defines technologies that allow applications,such as Word or Excel,to interact with the Web?
(Multiple Choice)
4.8/5
(35)
Visual Basic Script (VBScript)is a scripting language developed by which of the following companies?
(Multiple Choice)
4.8/5
(31)
CGI programs can be written in many different programming and scripting languages,such as C/C++,Perl,UNIX shells,Visual Basic,and FORTRAN.
(True/False)
4.7/5
(36)
Match each item with a statement below.
-Analysis of an application's source code for vulnerabilities
(Multiple Choice)
4.8/5
(39)
Which JavaScript function is a "method" or sequence of statements that perform a routine or task?
(Multiple Choice)
4.8/5
(23)
Which of the following cross-site scripting vulnerabilities types is especially harmful because it can be delivered to subsequent users of the application?
(Multiple Choice)
4.8/5
(38)
Connecting to an MS SQL Server database with Microsoft's Object Linking and Embedding Database (OLE DB)requires using which of the following providers?
(Multiple Choice)
4.9/5
(36)
Match each item with a statement below.
-A technology that developers can use to display HTML documents to users on the fly
(Multiple Choice)
4.8/5
(35)
Which of the following resources is an excellent starting point for security professionals when investigating VBScript vulnerabilities?
(Multiple Choice)
4.8/5
(39)
Showing 1 - 20 of 49
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)