C10
Which of the following application tests analyzes a running application for vulnerabilities? Executable Application Security Testing Static Application Security Testing Fast Application Security Testing Dynamic Application Security Testing
Dynamic Application Security Testing
Which of the following programming languages was originally used primarily on UNIX systems, but is used more widely now on many platforms, such as Macintosh and Windows? HTML VBScript PHP JScript
PHP
CGI programs can be written in many different programming and scripting languages, such as C/C++, Perl, UNIX shells, Visual Basic, and FORTRAN. True False
True
To check whether a CGI program works, you can test the URL in your Web browser. Which of the following directories should you save the program to on your Web server before you check the URL in your Web browser? scripts cgi-bin bin cgi
cgi-bin
What type of useful tools can a security tester find available in both Firefox and Chrome Web browsers? security tools developer tools scan tools SQL tools
developer tools
Which specific type of tag do All CFML tags begin with? # CF % CFML
CF
Adobe System's ColdFusion uses its proprietary tags, which are written in which of the following languages? CFML XML PHP DHTML
CFML
Which of the following is the interface that determines how a Web server passes data to a Web browser? ASP CGI Perl PHP
CGI
A user can view the source code of a PHP file by using their Web browser's tools. True False
False
JavaScript is a server-side scripting language that is embedded in an HTML Web page. True False
False
Visual Basic Script (VBScript) is a scripting language developed by which of the following companies? Macromedia Symantec Sun Microsystems Microsoft
Microsoft
Which of the following cross-site scripting vulnerabilities types is especially harmful because it can be delivered to subsequent users of the application? injected unvalidated Stored reflected
Stored
Which of the following does Object Linking and Embedding Database (OLE DB) rely on that allows an application to access data stored on an external device? program strings connection strings string interfaces SQL strings
connection strings
Which JavaScript function is a "method" or sequence of statements that perform a routine or task? getElementById() document.write() CFLOCATION()
getElementById()
Which type of vulnerabilities can result from a server accepting untrusted, unvalidated input? injection spoofing insertion redirection
injection
Which of the following cross-site scripting vulnerabilities types relies on social engineering to trick a user into visiting a maliciously crafted link or URL? unvalidated reflected injected Stored
reflected
Which of the following interfaces, developed by Microsoft, is a set of interfaces that enable applications to access data stored in a database management system (DBMS)? ADO JDBC OLE DB ODBC
OLE DB
What is the specific act of filtering, rejecting, or sanitizing a user's untrusted input before the application processes it? authorization discovery input auditing input validation
input validation
Connecting to an MS SQL Server database with Microsoft's Object Linking and Embedding Database (OLE DB) requires using which of the following providers? ADSDSOOBJECT MySQLProv SNAOLEDB SQLOLEDB
SQLOLEDB
Which of the following results from poorly configured technologies that a Web application runs on top of? reflected corruption stored misconfigurations security misconfigurations reflected misconfigurations
security misconfigurations