Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1 . Tell about . NET Framework components . 2 . Tell about the Java Platform, Enterprise Edition ( J 2 EE ) . 3

1. Tell about .NET Framework components.2. Tell about the Java Platform, Enterprise Edition (J2EE).3. What do you know about a service-oriented architecture (SOA)?4. Is it true? A web service allows for web-based communication to happenseamlessly using web-based standards, as in Simple Object Access Protocol (SOAP), HTTP, Web Services Description Language (WSDL), Universal Description, Discovery and Integration (UDDI), and Extensible Markup Language (XML).5. What are roles of SOAP, HTTP, Web Services Description Language (WSDL), Universal Description, Discovery and Integration (UDDI), and Extensible Markup Language (XML)?6. What do you know about mobile code?7. Explain Javas security model concept.8. What do you know about ActiveX Controls?9. What is the main security difference between Java applets and ActiveXcontrols?10.How do you understand Web Security?11.What are Specific Threats for Web Environments?Is it true? The most common types of vulnerabilities, threats, and complexities are covered in the following sections, which we will explore one at a time: Information gathering Administrative interfaces Authentication and access control Input validation Parameter validation Session managementExplain why?12.What kind of attacks can take place at many levels?13.What kind of different XSS vulnerabilities do you know? 14.What do you know about Web Application Security Principles?15. What do you know about Information gathering? Is it true? Usually the first step in an attackers methodology, in which the information gathered may allow an attacker to infer additional information that can be used to compromise systems.16.What do you know about Server side includes (SSI)? Is it true? An interpreted server-side scripting language used almost exclusively for web- based communication. It is commonly used to include the contents of one or more files into a web page on a web server. Allows web developers to reuse content by inserting the same content into multiple web documents. 17.What do you know about Client-side validation? Is it true? Input validation is done at the client before it is even sent back to the server to process.18.What do you know about Cross-site scripting (XSS)? Is it true? An attack where a vulnerability is found on a web site that allows an attacker to inject malicious code into a web application.19.What do you know about Parameter validation? Is it true? The values that are being received by the application are validated to be within defined limits before the server application processes them within the system.20.What do you know about Web proxy? Is it true? A piece of software installed on a system that is designed to intercept all traffic between the local web browser and the web server.21.What do you know about Replay attack? Is it true? An attacker capturing the traffic from a legitimate session and replaying it with the goal of masquerading an authenticated user?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Medical Image Databases

Authors: Stephen T.C. Wong

1st Edition

1461375398, 978-1461375395

More Books

Students also viewed these Databases questions

Question

=+ Have I included all the elements my readers expect to see?

Answered: 1 week ago

Question

Create a workflow analysis.

Answered: 1 week ago