Ethical Hacking Test 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

To embed PHP, an open-source server scripting language, into an HTML webpage, which tags should be used?

<?php and ?>

What element is used in an HTML document to allow customers to submit information to the web server?

<form> The &lt;form&gt; element is used in an HTML document for user input into a form.

What is the main difference between HTML pages and Active Server Pages (ASP)?

ASP uses scripting languages, such as JScript (Microsoft's version of JavaScript) or VBScript to create dynamic webpages. The main difference between HTML pages and Active Server Pages (ASP) is that with ASP, developers can display HTML documents to users on the fly. That is, when a user requests a webpage, one is created at that time. This is known as a dynamic webpage.

Which of the following is the interface that determines how a Web server passes data to a Web browser?

CGI Common Gateway Interface (CGI), which enables web designers to create dynamic HTML web applications, is the interface that determines how a web server passes data to a web browser.

To increase the impact a single vulnerability can have viruses, worms, Trojans, and other attack vectors take advantage of which of the following?

Cache Cache is often associated with buffer overflows.

To access a database from an ASP webpage, what initial step must be completed?

Create an ADO connection to the database to be accessed.

Which of the following can be a small program developed specifically for use with embedded systems, or a stripped-down version of an OS commonly used on general-purpose computers?

Embedded OS Embedded systems include their own operating system, called an "embedded operating system."

Which of the following is usually considered the biggest security threat to an organization?

Employees As a security tester, you need to remember that sometimes the biggest security threat to an organization is its employees. System administrators, network managers, and technicians often have unfettered, and unmonitored, access to a company's most critical IT components.

Which of the following best describes software that resides on a chip?

Firmware

What type of embedded OS is certified to run multiple levels of classification, such as unclassified, secret, and top secret, on the same CPU without leakage between levels?

MILS The U.S. military uses MILS OSs in high-security environments, and other organizations, such as those controlling nuclear power or municipal sewage plants, use them when separating privileges and functions is crucial.

What type of operating system sacrifices flexibility for simplicity and fewer hardware resources?

Microkernel Green Hill also designs embedded OS code used in printers, routers, switches, barcode scanners, and radios. The aforementioned OSs use a microkernel, which sacrifices flexibility for simplicity and fewer hardware resources.

Embedded Linux is an example of which type of operating system?

Monolithic

If you are concerned about the attack surface a system presents, what type of embedded OS configuration would you NOT use? Real-time Multiple embedded Single independent Single embedded

Multiple embedded

Which of the following interfaces is a standard database access method, developed by SQL Access Group, that allows an application to access data stored in a database management system (DBMS)?

ODBC Open Database Connectivity (ODBC) is a standard database access method developed by the SQL Access Group.

Which of the following programming languages was originally used primarily on UNIX systems, but is used more widely now on many platforms, such as Macintosh and Windows?

PHP PHP Hypertext Processor (PHP) enables web developers to create dynamic webpages. . PHP was originally used mainly on UNIX systems, but it's used more widely now on many platforms, including Macintosh and Windows.

What open-source embedded OS is found in many space systems because it supports processors designed specifically to operate in space?

RTEMS

Which of the following is a specialized type of embedded OS that is typically used in devices such as programmable thermostats, appliance controls, and even spacecraft?

RTOS One type of specialized embedded OS is a real-time operating system (RTOS), typically used in devices such as programmable thermostats, appliance controls, and even spacecraft.

To keep attackers from knowing the directory structure you create on an IIS web server, an individual should create what?

Virtual directory A virtual directory is a pointer to the physical directory.

To check whether a CGI program works, you can test the URL in your Web browser. Which of the following directories should you save the program to on your Web server before you check the URL in your Web browser?

cgi-bin To check whether the CGI program works, save the program to the cgi-bin directory of your web server, and then enter the URL in your web browser.

Which JavaScript function is a "method" or sequence of statements that perform a routine or task?

getElementById() The getElementById() function is a method, a sequence of statements that perform a routine or task, defined by the World Wide Web Consortium (W3C) Document Object Model (DOM).


Ensembles d'études connexes

Senderos 1 NN En La Clase Part 3

View Set

Ch 13: Normal and Altered Immune Responses

View Set

Drivers Ed Segment 2: Study Guide

View Set

Chemistry- chapter 2 Chemical equations and air quality

View Set

Chapter 3 - Organic compounds, DNA,

View Set

EDS500 Chapter 5: Learners with Intellectual and Developmental Disabilities

View Set