Chapter 13

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

17. Groups and individuals who may hack a web server or web application based on principle or personal beliefs are known as _________. a. white hats b. black hats c. script kiddies d. hacktivists

d. hacktivists get their title from the paradigm of hacktivism. These hackers launch attacks against targets because they believe those targets violate the attackers' morals, ethics, or principles.

8. Which of the following is used to set permissions on content in a website? a. hids b. ace c. acl d. als

c. access control lists (ACLs) are used to set permissions on web content and prvent or control certain levels of interaction by users.

9. What could be used to monitor application errors and violations on a web server or application? a. hids b. hips c. nids d. logs

d. logs can be used to monitor activity on a system, including web applications or web servers.

6. _________ can be used to identify a web server. a. session hijacking b. banner grab c. traversal d. header analysis

B. a banner grab can be used to connect to a service and extract information about it.

12. What is used to store session information? a. cookie b. snoop c. directory d. file

a. a cookie is used to store session information about browsing sessions and is a file that resides on a client.

15. How is brute-force attack performed? a. by trying all possible combinations of characters b. by trying dictionary words c. by capturing hashes d. by comparing hashes

a. brute force attacks are carried out by trying all possible combinations of characters in an attempt to uncover the correct one.

7. In the field of IT security, the concept of defense in depth is layering more than one control on another. Why would this be helpful in the defense of a system of session-hijacking? a. to provide better protection b. to build dependency among layers c. to increase logging ability d. to satsify auditors

a. defense in depth provides much better protection than a single layer. It also provides a means of slowing down and frustrating an attacker.

19. What may be helpful in protecting the content of a web server from being viewed by unauthorized personnel? a. encryption b. permissions c. redirection d. firewalls

a. encryption offers the ability to prevent content from being viewed by anyone not specifically authorized to view it.

2. ___________ is a client-side scripting language. a. javascript b. asp c. asp.net d. php

a. javascript is a client-side scripting langugage as opposed to languages such as ASP and ASP.NET.

11. A POODLE attack targets what exactly? a. ssl b. tls c. vpn d. aes

a. ssl, specifically, ssl 3.0 is targeted in this attack. This attack is possible when a browser cannot use TLS so instead switches to SSL 3.0 which has been deprecated.

14. Which command would retrieve banner information from a website at port 80? a. nc 192.168.10.27 80 b. nc 192.168.19.27 443 c. nc 192.168.10.27 -p 80 d. nc 192.168.10.27 -p -l 80

a. the command nc <target ip address> <port number> would allow a banner grab. Once the connection is establsihed, you would issue the command HEAD /HTTP/1.0 to retrieve HTTP headers.

16. What is the command to retrieve header information from a web server using Telnet? a. telnet <website name> 80 b. telnet <website name> 443 c. telnet <website name> -port:80 d. telnet <website name> -port:443

a. the correct command for retrieving header information from a website is telent <website name> 80.

10. Which of teh following is an attribute used to secure a cookie? a. encrypt b. secure c. httponly d. domain

b, c, d. Each of tehse flags can be used to provide security for a cookie, which wouldn't otherwise be provided.

3. Which of the following is an example of a server-side scripting language? a. javascript b. php c. sql d. html

b. PHP is a server-side language that has its actions handled by the server before delivering the results to the requester.

1. Which of the following best describes a web application? a. code designed to be run on the client b. code designed to be run on the server c. sql code for db's d. targeting of web services

b. a web application is code designed to be run on the server with the results sent to the client for presentation.

5. Which of the following can prevent bad input from being presented to an application through a form? a. request filtering b. input validation c. input scanning d. directory traversing

b. input validation is the process of checking input for correctness prior to its being accepted by an application. Unlike filtering, which works on the server side, validation works on the client side and prevents bad input from making it to the server.

13. Which attack can be used to take over a previous session? a. cookie snooping b. session hijacking c. cookie hijacking d. session sniffing

b. session hijacking can be used to take over an existing session that has been authenticated or to forge a valid session.

18. The Wayback Machine would be useful in viewing what type of information relating to a web application? a. get job postings b. websites c. archived versions of websites d. backup copies of websites

c. the wayback machine is used to view archived versions of websites if available. Not all websites are archived on the wayback machine., however.

20. A common attack against web servers and web applications is ________. a. banner grab b. input validation c. buffer validations d. buffer overflow

d. buffer overflows are a common flaw in software that typically can be fixed only by a software engineer.

4. Which of the following is used to access content outside the root of a website? a. brute force b. port scanning c. sql injection d. directory traversal

d. directory traversals are used to browse outside the root of the site or location nd access files or directories that should otherwise be hidden.


Ensembles d'études connexes

Prep U Fundamentals of Nursing CH 9

View Set

AP Chemistry Semester 1 Test Questions

View Set

"The Children's Hour" - Karen Wright (ACT THREE)

View Set

"Primera Generación 1963-73": La celebración, según Litto Nebbia

View Set

Math - Chapter 7 - Decimals - Scorey

View Set