Chapter 12 Quizzes
Which of the following best describes a phishing attack?
A user is tricked into believing that a legitimate website is requesting their login information.
Which of the following best describes a web application?
A web application is software that has been installed on a web server.
Which of the following best describes Microsoft Internet Information Services (IIS)?
A web server technology
Which of the following is an open-source web server technology?
Apache Web Server
Which of the following is a password cracking tool that can make over 50 simultaneous target connections?
Brutus
HTTP headers can contain hidden parameters such as user-agent, host headers, accept and referrer. Which of the following tool could you use to discover hidden parameters.
Burp Suite
Frank wants to do a penetration test. He is looking for a tool that checks for vulnerabilities in web applications, network systems, wireless networks, mobile devices, and defense systems such as IDS or IPS. Which of the following tools would you recommend to him?
COREImpact Pro
In 2011, Sony was targeted by an SQL injection attack that compromised over a million emails, usernames, and passwords. Which of the following could have prevented the attack?
Careful configuration and penetration testing on the front end.
Which type of web application requires a separate application to be installed before you can use the app?
Client-based web app
A hacker has used an SQL injection to deface a web page by inserting a malicious content and altering the contents of the database. Which of the following did the hacker accomplish?
Compromise data integrity
Which of the following steps in the web server hacking methodology involves setting up a web server sandbox to gain hands-on experience attacking a web server?
Mirroring
You are looking for a web application security tool that runs automated scans looking for vulnerabilities susceptible to SQL injection, cross-site scripting, and remote code injection. Which of the following web application security tools would you most likely use?
Netsparker
Which of the following types of injections can be injected into conversations between an application and a server to generate excessive amounts of spam email?
SMTP injection
You are looking for a web server security tool that will detect hidden malware in websites and advertisements. Which of the following security tools would you most likely use?
Hackalert
An attack is attempting to connect to a database using a web application system account instead of user-provided credentials. Which of the following methods is the attacker attempting to use?
Hijacking web credentials
Gathering information about a system, its components and how they work together is known as?
Footprinting
Which of the following footprinting methods would you use to scan a web server to find ports that the web server is using for various services?
Service discovery
Which of the following statements is true regarding cookies?
They were created to store information about user preferences and web activities.
SQL injections are a result of which of the following flaws?
Web applications
Which of the following HTTP response messages would you receive if additional action needs to be taken to complete the request?
3xx Redirection
As a penetration tester, you have found there is no data validation being completed at the server, which could leave the web applications vulnerable to SQL injection attacks. Which of the following could you use to help defend against this vulnerability?
Decline any entry that includes binary input, comment characters, or escape sequences.
The following are countermeasures you would take against a web application attack: - Secure remote administration and connectivity testing - Perform extensive input validation - Configure the firewall to deny ICMP traffic - Stop data processed by the attacker from being executed Which of the following attacks would these countermeasures prevent?
DoS attacks
Which of the following functions does a single quote (') perform in an SQL injection?
Indicates that data has ended and a command is beginning
Which of the following web server countermeasures is implemented to fix known vulnerabilities, eliminate bugs, and improve performance?
Install patches and updates
There are several types of signature evasion techniques. Which of the following best describes the obfuscated codes techniques?
Is an SQL statement that is hard to read and understand.
The SQL injection methodology has four parts. Which of the following parts is similar to playing the game 20 questions?
Launch a SQL attack.
Which of the following best describes the countermeasures you would take against a cross-site request forgery attack?
Log off immediately after using a web application. Clear the history after using a web application and don't allow your browser to save your login details.
Which of the following best describes the HTTP Request/Response TRACE?
Performs a loopback test to a target resource
Upload bombing and poison null byte attacks are designed to target which of the following web application vulnerabilities?
Scripting errors
Which of the following explains why web servers are often targeted by attackers?
Web servers provide an easily found, publicly accessible entrance to a network that users are encourages to enter into and browser.
You are analyzing the web applications in your company and have newly discovered vulnerabilities. You want to launch a denial-of-service (DoS) attack against the web server. Which of the following tools would you most likely use?
WebInspect
Which of the following types of web server attacks is characterized by altering or vandalizing a website's appearance in an attempt to humiliate, discredit, or annoy the victim?
Website defacement
As part of your penetration test, you have captured an FTP session as shown below. Which of the following concerns or recommendations will you include in your report?
FTP uses clear-text passwords
Which of the following best describes the SQL Power Injector tool?
A tool used to find SQL injections on a web page.
Web application use sessions to establish a connection and transfer sensitive information between a client and a server. Attacking an application's session management mechanisms can help you get around some of the authentication controls and allow you to use the permissions of more privileged application users. Which of the following type of attack could you use to accomplish this?
Cookie parameter tampering