Exam 15: Web Application Vulnerabilities
Exam 1: Ethics of Hacking and Cracking18 Questions
Exam 2: Reconnaissance17 Questions
Exam 3: Scanning Tools18 Questions
Exam 4: Sniffers18 Questions
Exam 5: TCP/IP Vulnerabilities18 Questions
Exam 6: Encryption and Password Cracking18 Questions
Exam 7: Spoofing18 Questions
Exam 8: Session Hijacking18 Questions
Exam 9: Hacking Network Devices18 Questions
Exam 10: Trojan Horses18 Questions
Exam 11: Denial-Of-Service Attacks18 Questions
Exam 12: Buffer Overflows18 Questions
Exam 13: Programming Exploits18 Questions
Exam 14: Mail Vulnerabilities18 Questions
Exam 15: Web Application Vulnerabilities18 Questions
Exam 16: Windows Vulnerabilities18 Questions
Exam 17: Unix/Linux Vulnerabilities18 Questions
Exam 18: Incident Handling19 Questions
Select questions type
HTTP error code ____ means the client stopped the request before the server finished retrieving it.
Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
D
The majority of network traffic on the Web is encrypted.
Free
(True/False)
4.8/5
(29)
Correct Answer:
False
The ____ dialog in a browser allows you to view the pages you have visited in the last user-defined number of days.
Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
B
A set of passwords is better than just one password because even the strongest password can be cracked, given sufficient time.
(True/False)
4.9/5
(32)
The protocols upon which the Internet rest are, by nature, secure.
(True/False)
4.7/5
(31)
What are some of the factors that lead to vulnerability of data and applications on the Web?
(Essay)
4.8/5
(35)
It is a proven fact that outsiders perpetrate most computer crimes.
(True/False)
4.9/5
(41)
A(n) _________________________ is a neutral zone between the private LAN and the public network of an organization.
(Short Answer)
4.8/5
(40)
____________________ is very complicated and intended to supply the base for all subsequent application layer and presentation layer software.
(Short Answer)
4.9/5
(32)
The two most widely used Web server applications are ____ and Microsoft Internet Information Server (IIS).
(Multiple Choice)
4.9/5
(35)
The most common source of Web-browser exploits is _________________________.
(Short Answer)
4.8/5
(30)
The open-source Mambo project is a content management system built on ____.
(Multiple Choice)
4.9/5
(32)
HTTP error code ____ means the server is looking for an encryption key from the client or is responding to a bad password entry.
(Multiple Choice)
4.7/5
(33)
___________________________________ facilities allow you to monitor all user activity on your private development machine and also to keep a record of Web server logs on a protected machine.
(Short Answer)
4.9/5
(23)
A(n) ____________________ is a small text file, stored on your computer by Web servers, that contains information about the last session when you visited the site.
(Short Answer)
4.7/5
(40)
In 2007 the average time between bringing an unsecured server (or client) onto the Internet, and its being infected by one of the thousands of circulating Internet worms, is less than 2 minutes.
(True/False)
4.9/5
(35)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)