Exam 8: Security of Web Applications
Exam 1: Introduction to Information Security50 Questions
Exam 2: Introduction to Networking50 Questions
Exam 3: Cryptography50 Questions
Exam 4: Firewall Technologies and Administration50 Questions
Exam 5: Network Authentication and Remote Access Using Vpn50 Questions
Exam 6: Network Monitoring and Intrusion Detection and Prevention Systems50 Questions
Exam 7: Wireless Network Security49 Questions
Exam 8: Security of Web Applications50 Questions
Exam 9: Network Vulnerability Assessment49 Questions
Exam 10: Auditing, Monitoring, and Logging50 Questions
Exam 11: Contingency Planning and Networking Incident Response50 Questions
Exam 12: Digital Forensics50 Questions
Select questions type
____ are collections of IP addresses of known spam sources on the Internet, and they can be easily integrated into most SMTP server configurations.
(Multiple Choice)
4.9/5
(33)
Match each item with a statement below.
a.Telnet
f.CGI
b.SNMP
g.Perl
c.NNTP
h.PHP
d.CSS
i.CSRF
e.XML
-Allows users to connect a remote shell to run programs, view files, and perform a variety of other operations as if they were using the system locally.
(Short Answer)
4.9/5
(42)
In 2010, OWASP determined that ____ attacks were the top risk to Web applications.
(Multiple Choice)
4.9/5
(35)
Match each item with a statement below.
a.Telnet
f.CGI
b.SNMP
g.Perl
c.NNTP
h.PHP
d.CSS
i.CSRF
e.XML
-Standardizes the HTML formatting for an entire Web site by allowing developers to customize fonts, tables, and other page elements.
(Short Answer)
4.8/5
(31)
Match each item with a statement below.
a.Telnet
f.CGI
b.SNMP
g.Perl
c.NNTP
h.PHP
d.CSS
i.CSRF
e.XML
-An attack that exploits a Web site's trust or previous authentication of a user.
(Short Answer)
4.9/5
(37)
Match each item with a statement below.
a.Telnet
f.CGI
b.SNMP
g.Perl
c.NNTP
h.PHP
d.CSS
i.CSRF
e.XML
-An API (application programming interface) that allows external programs or scripts to interact with a Web server.
(Short Answer)
4.9/5
(34)
Which HTTP request method retrieves meta-information only from the resource signified in the URI?
(Multiple Choice)
4.9/5
(34)
Why are more and more organizations turning to encryption to make sure data is stored in a format that cannot be leaked if a system is compromised?
(Essay)
4.8/5
(37)
Why is insufficient transport layer protection considered to be a threat in Web applications?.
(Essay)
4.7/5
(35)
What is the "POP before SMTP" authentication method and how is it used to defend against improper use of an SMTP server?
(Essay)
4.8/5
(18)
When properly configured to afford anonymous users only very limited access, the FTP server works well.
(True/False)
4.9/5
(35)
Which HTTP response code indicates that an error has occurred on the client side?
(Multiple Choice)
4.8/5
(47)
Match each item with a statement below.
a.Telnet
f.CGI
b.SNMP
g.Perl
c.NNTP
h.PHP
d.CSS
i.CSRF
e.XML
-Developed specifically to allow developers to create dynamically generated HTML content.
(Short Answer)
4.9/5
(29)
A(n) ____ is designed to translate information sent from a particular agent or class of agents.
(Multiple Choice)
4.9/5
(39)
____________________ queries are initiated by clients to resolve a fully qualified domain name (FQDN)to its IP address.
(Essay)
4.8/5
(35)
Explain why cross-site scripting (XSS) vulnerabilities may be the least understood.
(Essay)
4.9/5
(40)
The Common Gateway Interface (CGI) is a programming language in and of itself.
(True/False)
4.9/5
(30)
DNS ____________________ consists of inserting incorrect translation information within the DNS server (or within the communication between the resolver and server) in order to take a legitimate domain name and point the resolver to a malicious server, thereby secretly subverting the session.
(Short Answer)
4.9/5
(22)
Match each item with a statement below.
a.Telnet
f.CGI
b.SNMP
g.Perl
c.NNTP
h.PHP
d.CSS
i.CSRF
e.XML
-Used to monitor the status and performance of network devices and systems.
(Short Answer)
4.9/5
(35)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)