Exam 8: Security of Web Applications

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ are collections of IP addresses of known spam sources on the Internet, and they can be easily integrated into most SMTP server configurations.

(Multiple Choice)
4.9/5
(33)

Describe the most common way a Web client can access Web servers.

(Essay)
4.9/5
(34)

Match each item with a statement below. a.Telnet f.CGI b.SNMP g.Perl c.NNTP h.PHP d.CSS i.CSRF e.XML -Allows users to connect a remote shell to run programs, view files, and perform a variety of other operations as if they were using the system locally.

(Short Answer)
4.9/5
(42)

In 2010, OWASP determined that ____ attacks were the top risk to Web applications.

(Multiple Choice)
4.9/5
(35)

Match each item with a statement below. a.Telnet f.CGI b.SNMP g.Perl c.NNTP h.PHP d.CSS i.CSRF e.XML -Standardizes the HTML formatting for an entire Web site by allowing developers to customize fonts, tables, and other page elements.

(Short Answer)
4.8/5
(31)

Match each item with a statement below. a.Telnet f.CGI b.SNMP g.Perl c.NNTP h.PHP d.CSS i.CSRF e.XML -An attack that exploits a Web site's trust or previous authentication of a user.

(Short Answer)
4.9/5
(37)

Match each item with a statement below. a.Telnet f.CGI b.SNMP g.Perl c.NNTP h.PHP d.CSS i.CSRF e.XML -An API (application programming interface) that allows external programs or scripts to interact with a Web server.

(Short Answer)
4.9/5
(34)

Which HTTP request method retrieves meta-information only from the resource signified in the URI?

(Multiple Choice)
4.9/5
(34)

Why are more and more organizations turning to encryption to make sure data is stored in a format that cannot be leaked if a system is compromised?

(Essay)
4.8/5
(37)

Why is insufficient transport layer protection considered to be a threat in Web applications?.

(Essay)
4.7/5
(35)

What is the "POP before SMTP" authentication method and how is it used to defend against improper use of an SMTP server?

(Essay)
4.8/5
(18)

When properly configured to afford anonymous users only very limited access, the FTP server works well.

(True/False)
4.9/5
(35)

Which HTTP response code indicates that an error has occurred on the client side?

(Multiple Choice)
4.8/5
(47)

Match each item with a statement below. a.Telnet f.CGI b.SNMP g.Perl c.NNTP h.PHP d.CSS i.CSRF e.XML -Developed specifically to allow developers to create dynamically generated HTML content.

(Short Answer)
4.9/5
(29)

A(n) ____ is designed to translate information sent from a particular agent or class of agents.

(Multiple Choice)
4.9/5
(39)

____________________ queries are initiated by clients to resolve a fully qualified domain name (FQDN)to its IP address.

(Essay)
4.8/5
(35)

Explain why cross-site scripting (XSS) vulnerabilities may be the least understood.

(Essay)
4.9/5
(40)

The Common Gateway Interface (CGI) is a programming language in and of itself.

(True/False)
4.9/5
(30)

DNS ____________________ consists of inserting incorrect translation information within the DNS server (or within the communication between the resolver and server) in order to take a legitimate domain name and point the resolver to a malicious server, thereby secretly subverting the session.

(Short Answer)
4.9/5
(22)

Match each item with a statement below. a.Telnet f.CGI b.SNMP g.Perl c.NNTP h.PHP d.CSS i.CSRF e.XML -Used to monitor the status and performance of network devices and systems.

(Short Answer)
4.9/5
(35)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)