Matching
Match each term with the correct statement below.
Premises:
Created from the Web site that a user is currently viewing
Privileges that are granted to users to access hardware and software resources
Exploits previously unknown vulnerabilities so victims have no time to prepare or defend against the attacks.
Takes advantage of vulnerability in the Web application program or the Web server software so that a user can move from the root directory to other restricted directories
Targets vulnerabilities in client applications that interact with a compromised server or process malicious data
The ability to move to another directory could allow an unauthorized user to view confidential files or even enter commands to execute on a server
An attack involving using a third party to gain access rights.
Injects scripts into a Web application server that will then direct attacks at clients
Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining
Responses:
Cross-site scripting (XSS) attack
Zero day attack
Directory traversal attack
Client-side attack
Transitive access
First-party cookie
Command injection
Privilege escalation
Access rights
Correct Answer:
Premises:
Responses:
Created from the Web site that a user is currently viewing
Privileges that are granted to users to access hardware and software resources
Exploits previously unknown vulnerabilities so victims have no time to prepare or defend against the attacks.
Takes advantage of vulnerability in the Web application program or the Web server software so that a user can move from the root directory to other restricted directories
Targets vulnerabilities in client applications that interact with a compromised server or process malicious data
The ability to move to another directory could allow an unauthorized user to view confidential files or even enter commands to execute on a server
An attack involving using a third party to gain access rights.
Injects scripts into a Web application server that will then direct attacks at clients
Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining
Premises:
Created from the Web site that a user is currently viewing
Privileges that are granted to users to access hardware and software resources
Exploits previously unknown vulnerabilities so victims have no time to prepare or defend against the attacks.
Takes advantage of vulnerability in the Web application program or the Web server software so that a user can move from the root directory to other restricted directories
Targets vulnerabilities in client applications that interact with a compromised server or process malicious data
The ability to move to another directory could allow an unauthorized user to view confidential files or even enter commands to execute on a server
An attack involving using a third party to gain access rights.
Injects scripts into a Web application server that will then direct attacks at clients
Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining
Responses:
Related Questions
Q2: ARP poisoning is successful because there are
Q6: Describe the differences between XML and HTML.
Q7: When DNS servers exchange information among themselves
Q8: Describe the two types of privilege escalation.
Q11: _ is designed to display data, with
Q12: The SQL injection statement _ discovers the
Q13: Users who access a Web server are
Q14: List three of the most common Web
Q15: The expression _ up one directory level.<br>A)
Q41: Because the XSS is a widely known