Exam 13: Programming Exploits
Exam 1: Ethics of Hacking and Cracking18 Questions
Exam 2: Reconnaissance17 Questions
Exam 3: Scanning Tools18 Questions
Exam 4: Sniffers18 Questions
Exam 5: TCP/IP Vulnerabilities18 Questions
Exam 6: Encryption and Password Cracking18 Questions
Exam 7: Spoofing18 Questions
Exam 8: Session Hijacking18 Questions
Exam 9: Hacking Network Devices18 Questions
Exam 10: Trojan Horses18 Questions
Exam 11: Denial-Of-Service Attacks18 Questions
Exam 12: Buffer Overflows18 Questions
Exam 13: Programming Exploits18 Questions
Exam 14: Mail Vulnerabilities18 Questions
Exam 15: Web Application Vulnerabilities18 Questions
Exam 16: Windows Vulnerabilities18 Questions
Exam 17: Unix/Linux Vulnerabilities18 Questions
Exam 18: Incident Handling19 Questions
Select questions type
The design flaw in ActiveX is that ActiveX can do anything the user can do.
Free
(True/False)
4.8/5
(38)
Correct Answer:
True
____________________, Microsoft's answer to Netscape's JavaScript language, is loosely based on the Visual Basic programming language, but is much simpler.
Free
(Short Answer)
4.9/5
(30)
Correct Answer:
VBScript
____________________ controls are Component Object Model (COM) objects that can be embedded in a variety of applications.
Free
(Short Answer)
4.9/5
(37)
Correct Answer:
ActiveX
SSL encrypts the session, as well as the data that is being used in the session, using ____.
(Multiple Choice)
4.8/5
(35)
______________________________ is the most basic script used to develop Web pages and uses a set of markup tags, such as , to define the structure of Web pages.
(Short Answer)
4.9/5
(34)
How can attackers use ActiveX to modify resources on an implementation of Windows?
(Essay)
4.9/5
(35)
During the early days of the Internet, most Web pages were static HTML, so programming exploits could only be aimed at the client-side browsers.
(True/False)
4.9/5
(34)
HTML is a dynamic language, and can be executed successfully outside a Web browser.
(True/False)
4.8/5
(39)
The ____ vulnerability exploits an unchecked buffer in Internet Explorer processing HTML elements such as FRAME and IFRAME elements.
(Multiple Choice)
4.8/5
(37)
One of the least common exploits used on the Internet is a buffer overflow.
(True/False)
4.8/5
(38)
Up until ____, when Microsoft issued the patch that disables autoplay of ActiveX controls, ActiveX was becoming a widespread way to perform surreptitious installation of spyware and adware on Windows machines.
(Multiple Choice)
4.8/5
(30)
Secure transfer of data has been made available by protocols such as ____.
(Multiple Choice)
4.8/5
(42)
What security measures regarding ActiveX should you take if you are running Windows 2000 or Windows XP?
(Essay)
4.9/5
(33)
_________________________ are the defects in various programming languages that are used to develop server-side and client-side applications.
(Short Answer)
4.8/5
(32)
Java is designed to run in a platform-independent manner using _________________________ installed on the client computer as its sandbox.
(Short Answer)
4.8/5
(31)
____ controls are stand-alone compiled applications designed to make it possible to link and allow interactions between variously developed applications.
(Multiple Choice)
4.8/5
(36)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)