IS4560 CH 9 Hacking Web Servers Flashcards

1
Q
  1. Input validation is a result of SQL injections.

A. True B. False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
2. Web applications are used to \_\_\_\_\_\_\_\_.
A. Allow dynamic content 
B. Stream video 
C. Apply scripting 
D. Security controls
A

Allow dynamic content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
3. Which of the following challenges can be solved by firewalls?
A. Protection against buffer overflows 
B. Protection against scanning 
C. Enforcement of privileges 
D. Ability to use nonstandard ports
A

Protection against scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Databases can be a victim of source code exploits.
    A. True
    B. False
A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. The stability of a Web server does not depend on the operating system.
    A. True B. False
A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
6. \_\_\_\_\_\_\_\_ are scripting languages.
A. ActiveX 
B. Java 
C. CGI 
D. ASP.NET
A

ActiveX

Java

CGI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. ________ is used to audit databases.
    A. Ping
    B. IPConfig
    C. NGSSquirrel
A

NGSSquirrel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
8. Browsers do not display \_\_\_\_\_\_\_\_.
A. ActiveX 
B. Hidden fields 
C. Java 
D. Javascript
A

Hidden fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
9. \_\_\_\_\_\_\_\_ can be caused by the exploitation of defects and code.
A. Buffer overflows 
B. SQL injection 
C. Buffer injection 
D. Input validation
A

SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly