CEH Chapter 14 Quiz
9. Proper input validation can prevent what from occurring? A. Client-side issues B. Operating system exploits C. SQL injection attacks D. Software failure
Operating system exploits
3. Which of the following challenges can be solved by firewalls? A. Protection against buffer overflows B. Protection against scanning C. Enforcement of privileges D. Ability to use nonstandard ports
Protection against scanning
2. Web applications are used to __________. A. Provide dynamic content B. Stream video C. Apply scripting D. Implement security controls
Provide dynamic content
18. What type of database uses multiple tables linked together in complex relationships? A. Hierarchical B. Relational C. Distributed D. Flat
Relational
16. Which of the following is another name for a record in a database? A. Row B. Column C. Cell D. Label
Row
10. __________ can be used to attack databases. A. Buffer overflows B. SQL injection C. Buffer injection D. Input validation
SQL injection
7. __________ is used to audit databases. A. Ping B. Ipconfig C. SQLPing D. Traceroute
SQLPing
13. Which statement is used to limit data in SQL Server? A. cmdshell B. WHERE C. SELECT D. to
WHERE
14. Which command is used to remove a table from a database? A. cmdshell -drop table B. REMOVE C. DROPTABLES D. drop table
drop table
11. Which command can be used to access the command prompt in SQL Server? A. WHERE B. SELECT C. xp_cmdshell D. cmdshell
xp_cmdshell
19. What can an error message tell an attacker? A. Success of an attack B. Failure of an attack C. Structure of a database D. All of the above
All of the above
12. Which command is used to query data in SQL Server? A. cmdshell B. WHERE C. SELECT D. from
B. WHERE C. SELECT D. from
1. Input validation is used to prevent which of the following? A. Bad input B. Formatting issues C. Language issues D. SQL injection
Bad input
6. Which of the following is a scripting language? A. ActiveX B. Java C. CGI D. ASP.NET
CGI
4. Databases can be a victim of code exploits depending on which of the following? A. Configuration B. Vendor C. Patches D. Client version
Configuration
15. SQL injection attacks are aimed at which of the following? A. Web applications B. Web servers C. Databases D. Database engines
Databases
17. What type of database has its information spread across many disparate systems? A. Hierarchical B. Relational C. Distributed D. Flat
Distributed
20. A blind SQL injection attack is used when which of the following is true? A. Error messages are not available. B. The database is not SQL compatible. C. The database is relational. D. All of the above.
Error messages are not available
8. Browsers do not display __________. A. ActiveX B. Hidden fields C. Java D. JavaScript
Hidden fields
5. In addition to relational databases, there is also what kind of database? A. Hierarchical B. SQL C. ODBC D. Structured
Hierarchical