Exam 10: Hacking Web Servers
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review49 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering48 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals50 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: the Hidden Threat59 Questions
Exam 10: Hacking Web Servers49 Questions
Exam 11: Hacking Wireless Networks50 Questions
Exam 12: Cryptography50 Questions
Exam 13: Network Protection Systems59 Questions
Select questions type
Match each item with a statement below.
-The interface that determines how a Web server passes data to a Web browser
(Multiple Choice)
4.8/5
(31)
Which type of vulnerabilities can result from a server accepting untrusted,unvalidated input?
(Multiple Choice)
4.9/5
(31)
Match each item with a statement below.
-Displays the same information on the Web page regardless of who accesses the page
(Multiple Choice)
4.7/5
(40)
What is the specific act of checking a user's privileges to understand if they should or should not have access to a page,field,resource,or action in an application?
(Multiple Choice)
4.9/5
(28)
As a security professional,what should you do after identifying that a Web server you are testing is using PHP?
(Essay)
4.7/5
(32)
Adobe System's ColdFusion uses its proprietary tags,which are written in which of the following languages?
(Multiple Choice)
4.7/5
(38)
What is ActiveX Data Objects (ADO),and name an application that uses ADO to interact with the Web?
(Essay)
4.9/5
(24)
Which of the following interfaces,developed by Microsoft,is a set of interfaces that enable applications to access data stored in a database management system (DBMS)?
(Multiple Choice)
5.0/5
(36)
Which of the following interfaces is a standard database access method,developed by SQL Access Group,that allows an application to access data stored in a database management system (DBMS)?
(Multiple Choice)
4.8/5
(25)
Which of the following results from poorly configured technologies that a Web application runs on top of?
(Multiple Choice)
4.7/5
(44)
What type of useful tools can a security tester find available in both Firefox and Chrome Web browsers?
(Multiple Choice)
4.8/5
(30)
OLE DB relies on connection strings that enable the application to access the data stored on an external device.
(True/False)
4.7/5
(32)
Dynamic Web pages need special components for displaying information that changes depending on user input or information obtained from a back-end server.What kind of components can Web pages use to achieve this?
(Essay)
4.9/5
(41)
To check whether a CGI program works,you can test the URL in your Web browser.Which of the following directories should you save the program to on your Web server before you check the URL in your Web browser?
(Multiple Choice)
4.7/5
(43)
Why should security professionals have at least a little knowledge about the Apache Web Server?
(Essay)
4.9/5
(47)
Which of the following does Object Linking and Embedding Database (OLE DB)rely on that allows an application to access data stored on an external device?
(Multiple Choice)
4.9/5
(29)
Match each item with a statement below.
-Standard database access method developed by the SQL Access Group and allows interoperability between back-end DBMSs
(Multiple Choice)
4.8/5
(28)
Showing 21 - 40 of 49
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)