Exam 10: Hacking Web Servers

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is the interface that determines how a Web server passes data to a Web browser?

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

C

Which of the following programming languages was originally used primarily on UNIX systems,but is used more widely now on many platforms,such as Macintosh and Windows?

Free
(Multiple Choice)
5.0/5
(38)
Correct Answer:
Verified

D

Which of the following application tests analyzes a running application for vulnerabilities?

Free
(Multiple Choice)
4.8/5
(42)
Correct Answer:
Verified

C

Match each item with a statement below. -The analysis of a running application for vulnerabilities

(Multiple Choice)
4.7/5
(31)

Match each item with a statement below. -Open-source server-side scripting language that runs on a server and enables Web developers to create dynamic Web pages

(Multiple Choice)
5.0/5
(32)

Match each item with a statement below. -The attacker supplies SQL commands when prompted to fill in a Web application field

(Multiple Choice)
4.7/5
(39)

Which of the following cross-site scripting vulnerabilities types relies on social engineering to trick a user into visiting a maliciously crafted link or URL?

(Multiple Choice)
4.8/5
(35)

What is the specific act of filtering,rejecting,or sanitizing a user's untrusted input before the application processes it?

(Multiple Choice)
4.8/5
(41)

Which of the following is a programming interface for connecting a Web application to a database and defines technologies that allow applications,such as Word or Excel,to interact with the Web?

(Multiple Choice)
4.8/5
(35)

Visual Basic Script (VBScript)is a scripting language developed by which of the following companies?

(Multiple Choice)
4.8/5
(31)

CGI programs can be written in many different programming and scripting languages,such as C/C++,Perl,UNIX shells,Visual Basic,and FORTRAN.

(True/False)
4.7/5
(36)

Match each item with a statement below. -Analysis of an application's source code for vulnerabilities

(Multiple Choice)
4.8/5
(39)

Which specific type of tag do All CFML tags begin with?

(Multiple Choice)
4.8/5
(35)

Which JavaScript function is a "method" or sequence of statements that perform a routine or task?

(Multiple Choice)
4.8/5
(23)

Which of the following cross-site scripting vulnerabilities types is especially harmful because it can be delivered to subsequent users of the application?

(Multiple Choice)
4.8/5
(38)

What is ColdFusion and which company owns the rights to ColdFusion?

(Essay)
4.8/5
(28)

Connecting to an MS SQL Server database with Microsoft's Object Linking and Embedding Database (OLE DB)requires using which of the following providers?

(Multiple Choice)
4.9/5
(36)

What is ODBC,and how can it be utilized?

(Essay)
4.9/5
(36)

Match each item with a statement below. -A technology that developers can use to display HTML documents to users on the fly

(Multiple Choice)
4.8/5
(35)

Which of the following resources is an excellent starting point for security professionals when investigating VBScript vulnerabilities?

(Multiple Choice)
4.8/5
(39)
Showing 1 - 20 of 49
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)