Deck 8: Security of Web Applications

Full screen (f)
exit full mode
Question
What is the best way to secure FTP or TFTP?

A) Install FTP on the client and TFTP on the server.
B) Install FTP on the server and TFTP on the client.
C) Use anonymous FTP.
D) Employ encryption and authentication.
Use Space or
up arrow
down arrow
to flip the card.
Question
____ is a simple method of transferring files between computer systems.

A) IMAP
C) NNTP
B) FTP
D) SNMP
Question
In passive mode, the FTP client must listen and wait for the server connection.
Question
With ____ mode, a trusted internal FTP client makes an outgoing request to the FTP server.

A) passive
C) simple
B) active
D) aggressive
Question
A(n) ____ is designed to translate information sent from a particular agent or class of agents.

A) CGI script
C) passphrase
B) RBL
D) MIB
Question
One of the biggest strengths of Perl is its ____-manipulation abilities.

A) script
C) string
B) numeric
D) text
Question
____ is the basis for Web communication.

A) CSS
C) HTTP
B) DNS
D) HTML
Question
When properly configured to afford anonymous users only very limited access, the FTP server works well.
Question
____ is a key component of the Web, working in conjunction with HTTP to move content from servers to clients.

A) XML
C) PHP
B) HTML
D) CSS
Question
The Common Gateway Interface (CGI) is a programming language in and of itself.
Question
Which HTTP response code indicates that an error has occurred on the client side?

A) 100
C) 401
B) 200
D) 503
Question
____ are collections of IP addresses of known spam sources on the Internet, and they can be easily integrated into most SMTP server configurations.

A) Real-time blacklistings (RBLs)
C) SMTP traps
B) Cross-site scriptings
D) Domain Name Security Extensions
Question
What is the best way to secure Telnet?

A) Scrub all user input to make sure no invalid characters are passed in the Telnet statement
B) Do not use Telnet at all.
C) Use anonymous Telnet.
D) Use strong passwords that never change.
Question
DNS ____ provide a mechanism to divide ownership responsibility among various DNS servers and the organizations they serve.

A) zones
C) scripts
B) agents
D) registries
Question
Which HTTP request method retrieves meta-information only from the resource signified in the URI?

A) HEAD
C) GET
B) OPTIONS
D) POST
Question
A sender with a valid internal IP address should be allowed to send e-mail to external e-mail addresses.
Question
To provide monitoring, an SNMP ____ must be installed on a desired host or network device.

A) script
C) agent
B) passcode
D) signature
Question
Most of the weaknesses with SNMP occur with Version 1 of SNMP.
Question
An SMTP ____ is a simple message providing status information about the monitored device.

A) agent
C) script
B) trap
D) passphrase
Question
A major problem with FTP is that data is transferred in ____.

A) encapsulated packets
C) segments
B) fragments
D) plaintext
Question
Match each item with a statement below.
a.Telnet
f.CGI
b.SNMP
g.Perl
c.NNTP
h.PHP
d.CSS
i.CSRF
e.XML
Developed specifically to allow developers to create dynamically generated HTML content.
Question
In 2010, OWASP determined that ____ attacks were the top risk to Web applications.

A) cross-site scripting
C) cross-site request forgery
B) injection
D) security misconfiguration
Question
During a(n) ____________________ attack, a malicious user sends a flood of e-mail to the e-mail server.
Question
DNS ____________________ consists of inserting incorrect translation information within the DNS server (or within the communication between the resolver and server) in order to take a legitimate domain name and point the resolver to a malicious server, thereby secretly subverting the session.
Question
Match each item with a statement below.
a.Telnet
f.CGI
b.SNMP
g.Perl
c.NNTP
h.PHP
d.CSS
i.CSRF
e.XML
Developed in 1987 by Larry Wall as an interpreted language (based on C syntax) that helps provide a more robust scripting capability for UNIX.
Question
____________________ queries are initiated by clients to resolve a fully qualified domain name (FQDN)to its IP address.
Question
Match each item with a statement below.
a.Telnet
f.CGI
b.SNMP
g.Perl
c.NNTP
h.PHP
d.CSS
i.CSRF
e.XML
Standardizes the HTML formatting for an entire Web site by allowing developers to customize fonts, tables, and other page elements.
Question
Match each item with a statement below.
a.Telnet
f.CGI
b.SNMP
g.Perl
c.NNTP
h.PHP
d.CSS
i.CSRF
e.XML
An API (application programming interface) that allows external programs or scripts to interact with a Web server.
Question
____________________ is used to send Internet mail.
Question
What is the best way to direct visitors to a new location or page?

A) Create a .htaccess file with the following entry: Redirect 301 /old/old.html /new/new.html.
B) Use an SMTP agent.
C) Use Secure Shell (SSH).
D) Generate random tokens with the various HTML forms used by a user.
Question
Match each item with a statement below.
a.Telnet
f.CGI
b.SNMP
g.Perl
c.NNTP
h.PHP
d.CSS
i.CSRF
e.XML
An extension to HTML that allows developers to define their own tags for structure.
Question
Match each item with a statement below.
a.Telnet
f.CGI
b.SNMP
g.Perl
c.NNTP
h.PHP
d.CSS
i.CSRF
e.XML
Used to monitor the status and performance of network devices and systems.
Question
Match each item with a statement below.
a.Telnet
f.CGI
b.SNMP
g.Perl
c.NNTP
h.PHP
d.CSS
i.CSRF
e.XML
Designed to facilitate Usenet newsgroup communications.
Question
What is the best way to make sure data is properly encrypted while in transit?

A) Install an SNMP agent.
B) Make sure sensitive pages require authentication.
C) Use the"secure"flag on all sensitive cookies.
D) Scrub all user input to make sure no invalid characters are passed in an SQL statement.
Question
____ was originally developed as a client-side language, which means the code is interpreted on the client side instead of on the Web server.

A) AJAX
C) JavaScript
B) Perl
D) CSS
Question
The ____________________ is a set of applications (the software) that runs on top of the Internet.
Question
____ refers to a new use of existing technologies.

A) XML
C) AJAX
B) PHP
D) JavaScript
Question
Match each item with a statement below.
a.Telnet
f.CGI
b.SNMP
g.Perl
c.NNTP
h.PHP
d.CSS
i.CSRF
e.XML
Allows users to connect a remote shell to run programs, view files, and perform a variety of other operations as if they were using the system locally.
Question
What is the best way to restrict URL access?

A) Redirect visitors to another page.
B) Make sure sensitive pages require authentication.
C) Use the"secure"flag on all sensitive cookies.
D) Use Secure Shell (SSH).
Question
Match each item with a statement below.
a.Telnet
f.CGI
b.SNMP
g.Perl
c.NNTP
h.PHP
d.CSS
i.CSRF
e.XML
An attack that exploits a Web site's trust or previous authentication of a user.
Question
Provide a brief overview of DNS operations.
Question
Why are more and more organizations turning to encryption to make sure data is stored in a format that cannot be leaked if a system is compromised?
Question
List five best practices a Web system administrators should use to secure a Web server.
Question
Compare the Trivial File Transfer Protocol (TFTP) to FTP.
Question
List four standard operations that can be performed by the LDAP protocol.
Question
Describe the most common way a Web client can access Web servers.
Question
Explain why cross-site scripting (XSS) vulnerabilities may be the least understood.
Question
Describe an open relay.
Question
What is the "POP before SMTP" authentication method and how is it used to defend against improper use of an SMTP server?
Question
Why is insufficient transport layer protection considered to be a threat in Web applications?.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Security of Web Applications
1
What is the best way to secure FTP or TFTP?

A) Install FTP on the client and TFTP on the server.
B) Install FTP on the server and TFTP on the client.
C) Use anonymous FTP.
D) Employ encryption and authentication.
D
2
____ is a simple method of transferring files between computer systems.

A) IMAP
C) NNTP
B) FTP
D) SNMP
B
3
In passive mode, the FTP client must listen and wait for the server connection.
False
4
With ____ mode, a trusted internal FTP client makes an outgoing request to the FTP server.

A) passive
C) simple
B) active
D) aggressive
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
A(n) ____ is designed to translate information sent from a particular agent or class of agents.

A) CGI script
C) passphrase
B) RBL
D) MIB
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
One of the biggest strengths of Perl is its ____-manipulation abilities.

A) script
C) string
B) numeric
D) text
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
____ is the basis for Web communication.

A) CSS
C) HTTP
B) DNS
D) HTML
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
When properly configured to afford anonymous users only very limited access, the FTP server works well.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
____ is a key component of the Web, working in conjunction with HTTP to move content from servers to clients.

A) XML
C) PHP
B) HTML
D) CSS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
The Common Gateway Interface (CGI) is a programming language in and of itself.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Which HTTP response code indicates that an error has occurred on the client side?

A) 100
C) 401
B) 200
D) 503
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
____ are collections of IP addresses of known spam sources on the Internet, and they can be easily integrated into most SMTP server configurations.

A) Real-time blacklistings (RBLs)
C) SMTP traps
B) Cross-site scriptings
D) Domain Name Security Extensions
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
What is the best way to secure Telnet?

A) Scrub all user input to make sure no invalid characters are passed in the Telnet statement
B) Do not use Telnet at all.
C) Use anonymous Telnet.
D) Use strong passwords that never change.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
DNS ____ provide a mechanism to divide ownership responsibility among various DNS servers and the organizations they serve.

A) zones
C) scripts
B) agents
D) registries
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Which HTTP request method retrieves meta-information only from the resource signified in the URI?

A) HEAD
C) GET
B) OPTIONS
D) POST
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
A sender with a valid internal IP address should be allowed to send e-mail to external e-mail addresses.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
To provide monitoring, an SNMP ____ must be installed on a desired host or network device.

A) script
C) agent
B) passcode
D) signature
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Most of the weaknesses with SNMP occur with Version 1 of SNMP.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
An SMTP ____ is a simple message providing status information about the monitored device.

A) agent
C) script
B) trap
D) passphrase
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
A major problem with FTP is that data is transferred in ____.

A) encapsulated packets
C) segments
B) fragments
D) plaintext
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Match each item with a statement below.
a.Telnet
f.CGI
b.SNMP
g.Perl
c.NNTP
h.PHP
d.CSS
i.CSRF
e.XML
Developed specifically to allow developers to create dynamically generated HTML content.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
In 2010, OWASP determined that ____ attacks were the top risk to Web applications.

A) cross-site scripting
C) cross-site request forgery
B) injection
D) security misconfiguration
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
During a(n) ____________________ attack, a malicious user sends a flood of e-mail to the e-mail server.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
DNS ____________________ consists of inserting incorrect translation information within the DNS server (or within the communication between the resolver and server) in order to take a legitimate domain name and point the resolver to a malicious server, thereby secretly subverting the session.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Match each item with a statement below.
a.Telnet
f.CGI
b.SNMP
g.Perl
c.NNTP
h.PHP
d.CSS
i.CSRF
e.XML
Developed in 1987 by Larry Wall as an interpreted language (based on C syntax) that helps provide a more robust scripting capability for UNIX.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
____________________ queries are initiated by clients to resolve a fully qualified domain name (FQDN)to its IP address.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Match each item with a statement below.
a.Telnet
f.CGI
b.SNMP
g.Perl
c.NNTP
h.PHP
d.CSS
i.CSRF
e.XML
Standardizes the HTML formatting for an entire Web site by allowing developers to customize fonts, tables, and other page elements.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Match each item with a statement below.
a.Telnet
f.CGI
b.SNMP
g.Perl
c.NNTP
h.PHP
d.CSS
i.CSRF
e.XML
An API (application programming interface) that allows external programs or scripts to interact with a Web server.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
____________________ is used to send Internet mail.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
What is the best way to direct visitors to a new location or page?

A) Create a .htaccess file with the following entry: Redirect 301 /old/old.html /new/new.html.
B) Use an SMTP agent.
C) Use Secure Shell (SSH).
D) Generate random tokens with the various HTML forms used by a user.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Match each item with a statement below.
a.Telnet
f.CGI
b.SNMP
g.Perl
c.NNTP
h.PHP
d.CSS
i.CSRF
e.XML
An extension to HTML that allows developers to define their own tags for structure.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Match each item with a statement below.
a.Telnet
f.CGI
b.SNMP
g.Perl
c.NNTP
h.PHP
d.CSS
i.CSRF
e.XML
Used to monitor the status and performance of network devices and systems.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Match each item with a statement below.
a.Telnet
f.CGI
b.SNMP
g.Perl
c.NNTP
h.PHP
d.CSS
i.CSRF
e.XML
Designed to facilitate Usenet newsgroup communications.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
What is the best way to make sure data is properly encrypted while in transit?

A) Install an SNMP agent.
B) Make sure sensitive pages require authentication.
C) Use the"secure"flag on all sensitive cookies.
D) Scrub all user input to make sure no invalid characters are passed in an SQL statement.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
____ was originally developed as a client-side language, which means the code is interpreted on the client side instead of on the Web server.

A) AJAX
C) JavaScript
B) Perl
D) CSS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
The ____________________ is a set of applications (the software) that runs on top of the Internet.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
____ refers to a new use of existing technologies.

A) XML
C) AJAX
B) PHP
D) JavaScript
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Match each item with a statement below.
a.Telnet
f.CGI
b.SNMP
g.Perl
c.NNTP
h.PHP
d.CSS
i.CSRF
e.XML
Allows users to connect a remote shell to run programs, view files, and perform a variety of other operations as if they were using the system locally.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
What is the best way to restrict URL access?

A) Redirect visitors to another page.
B) Make sure sensitive pages require authentication.
C) Use the"secure"flag on all sensitive cookies.
D) Use Secure Shell (SSH).
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Match each item with a statement below.
a.Telnet
f.CGI
b.SNMP
g.Perl
c.NNTP
h.PHP
d.CSS
i.CSRF
e.XML
An attack that exploits a Web site's trust or previous authentication of a user.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Provide a brief overview of DNS operations.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Why are more and more organizations turning to encryption to make sure data is stored in a format that cannot be leaked if a system is compromised?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
List five best practices a Web system administrators should use to secure a Web server.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Compare the Trivial File Transfer Protocol (TFTP) to FTP.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
List four standard operations that can be performed by the LDAP protocol.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Describe the most common way a Web client can access Web servers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Explain why cross-site scripting (XSS) vulnerabilities may be the least understood.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Describe an open relay.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
What is the "POP before SMTP" authentication method and how is it used to defend against improper use of an SMTP server?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Why is insufficient transport layer protection considered to be a threat in Web applications?.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.