Chapter 10 Flashcards
What is the specific act of filtering, rejecting, or sanitizing a user’s untrusted input before the application processes it?
input validation
What is the specific act of filtering, rejecting, or sanitizing a user’s untrusted input before the application processes it?
input validation
The AccessFileName directive in Apache, along with a configuration file (such as .htaccess), can be used to perform which of the following on a Web site?
Restrict directory access to those with authorized user credentials.
Which of the following is an alternative term used when referring to Application Security?
AppSec
Connecting to an MS SQL Server database with Microsoft’s Object Linking and Embedding Database (OLE DB) requires using which of the following providers?
SQLOLEDB
Which type of vulnerabilities can result from a server accepting untrusted, unvalidated input?
injection
What tag is used to indicate ASP code?
What is the specific act of checking a user’s privileges to understand if they should or should not have access to a page, field, resource, or action in an application?
authorization
HTML Web pages containing connection strings are more vulnerable to attack. True or False?
True
Web servers use which of the following elements in an HTML document to allow an individual to submit information to the Web server?
Entering the value OR 1=1 in a Web application that has an “Enter Your PIN” field is most likely an example of which attack?
SQL injection
If a Web server isn’t protected, an attacker can gain access through remote administration interfaces. True or False?
True
OLE DB relies on connection strings that enable the application to access the data stored on an external device.
True
Which of the following can be used to connect a Web server to a back-end database server? (Choose all that apply.)
OLE DB
ADO
ODBC
To check whether a CGI program works, you can test the URL in your Web browser. Which of the following directories should you save the program to on your Web server before you check the URL in your Web browser?
cgi-bin
Which of the following vulnerabilities occur when untrusted data is accepted as input to an application without being properly validated?
injection vulnerability
Adobe System’s ColdFusion uses its proprietary tags, which are written in which of the following languages?
CFML
CGI is used in Microsoft ASP pages. True or False?
False
Which of the following application tests analyzes an application’s source code for vulnerabilities, and is therefore only possible when the source code of an application is available?
Static Application Security Testing
CGI programs can be written in many different programming and scripting languages, such as C/C++, Perl, UNIX shells, Visual Basic, and FORTRAN.
True
Which specific type of tag do All CFML tags begin with?
CF
Which JavaScript function is a “method” or sequence of statements that perform a routine or task?
getElementById()
Which of the following interfaces, developed by Microsoft, is a set of interfaces that enable applications to access data stored in a database management system (DBMS)?
OLE DB
A user can view the source code of a PHP file by using their Web browser’s tools.
False