Question
1. One way to verify if a system is attacked by a brute-force attack is to periodically check the log files. True False 2. Content
1. One way to verify if a system is attacked by a brute-force attack is to periodically check the log files.
- True
- False
2. Content spoofing tactics often include which of the following?
- Spam e-mail links
- Forum links
- Chatroom links
- Aand C only
- All of the above
- How do XSS attacks differ from CSRE attacks?
- Which of the following attacks involve the use of CR and LF characters? (Select two.)
- HTTP request smuggling
- HTTP response smuggling
- HTTP request splitting
- HTTP response splitting
5. A common path traversal attack uses which syntax sequence to attempt to locate restricted areas on a server?
A. --/
B.*.*
C. CR
D. LF
6. During a session fixation attack, in which ways can an attacker obtain a valid session identifier? (Select three.)
- Prediction
- Capture
- Fixation
- Spoofing.
7.Which attack allows the attacker to access, read, delete, and modify information held within a database and even take control of the server
on which the database is operating?
8.Which of the following are actual XML-related attacks? (Select two.)
- XML attribute blowup
- XML internal entities
- XML entity expression
- XML injection
9. Which of the following are Web site weaknesses discussed in this chapter?
(Select three.)
- OS commanding
- Improper file system permissions
- Insufficient authentication
- Fingerprinting
- Server misconfiguration
10. Applications hardening is the process of securing applications in use on a network.
- True
- False
11. To avoid improper input handling, which approaches can you use when handling user input? (Select three.)
- Stripping
- Sanitization
- Rejecting known bad input
- Accepting only known good input
12. Which of the following is a strategy for reducing the risk of data leakage?
- Sanitization
- Strong firewall controls
- Authorization
- Encryption
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started