Module 10 Quiz Flashcards

1
Q

Web applications written in CFML can also contain other client-side technologies, such as HTML and JavaScript (True or False)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following cross-site scripting vulnerabilities types is especially harmful because it can be delivered to subsequent users of the application?

A

Stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following application tests analyzes an application’s source code for vulnerabilities, and is therefore only possible when the source code of an application is available?

A

Static Application Security Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Visual Basic Script (VBScript) is a scripting language developed by which of the following companies?

A

Microsoft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following does Object Linking and Embedding Database (OLE DB) rely on that allows an application to access data stored on an external device?

A

connection strings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following programming languages was originally used primarily on UNIX systems, but is used more widely now on many platforms, such as Macintosh and Windows?

A

PHP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CGI programs can be written in many different programming and scripting languages, such as C/C++, Perl, UNIX shells, Visual Basic, and FORTRAN. (True or False)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A user can view the source code of a PHP file by using their Web browser’s tools. (True or False)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following results from poorly configured technologies that a Web application runs on top of?

A

security misconfigurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of vulnerabilities can result from a server accepting untrusted, unvalidated input?

A

injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which JavaScript function is a “method” or sequence of statements that perform a routine or task?

A

getElementById()

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following resources is an excellent starting point for security professionals when investigating VBScript vulnerabilities?

A

Microsoft Security Bulletin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is an alternative term used when referring to Application Security?

A

AppSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following application tests analyzes a running application for vulnerabilities?

A

Dynamic Application Security Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following refers to the flow a user is expected to follow in an application to accomplish a goal?

A

business logic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which specific type of tag do All CFML tags begin with?

A

CF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What type of useful tools can a security tester find available in both Firefox and Chrome Web browsers?

A

developer tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is a programming interface for connecting a Web application to a database and defines technologies that allow applications, such as Word or Excel, to interact with the Web?

A

ADO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Adobe System’s ColdFusion uses its proprietary tags, which are written in which of the following languages?

A

CFML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the specific act of checking a user’s privileges to understand if they should or should not have access to a page, field, resource, or action in an application?

A

authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following interfaces, developed by Microsoft, is a set of interfaces that enable applications to access data stored in a database management system (DBMS)?

A

OLE DB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Connecting to an MS SQL Server database with Microsoft’s Object Linking and Embedding Database (OLE DB) requires using which of the following providers?

A

SQLOLEDB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

OLE DB relies on connection strings that enable the application to access the data stored on an external device. (True or False)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following is the interface that determines how a Web server passes data to a Web browser?

A

CGI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

To check whether a CGI program works, you can test the URL in your Web browser. Which of the following directories should you save the program to on your Web server before you check the URL in your Web browser?

A

cgi-bin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the specific act of filtering, rejecting, or sanitizing a user’s untrusted input before the application processes it?

A

input validation

27
Q

Which of the following cross-site scripting vulnerabilities types relies on social engineering to trick a user into visiting a maliciously crafted link or URL?

A

reflected

28
Q

What feature implemented in Windows Server 2016 allows for application isolation to protect applications from one another?

A

Windows Containers

29
Q

What type of Windows Server is the most likely server to be targeted by a computer hacker?

A

Domain Controller

30
Q

What feature implemented in Windows 8.1 prevents the execution of non-trusted boot content, preventing rootkits?

A
31
Q

Which of the following is the act of performing a task over and over?

A

Looping

32
Q

What federal law makes it illegal to intercept any type of communication, regardless of how it was transmitted?

A

Electronic Communication Privacy Act

33
Q

What security certification did the “The International Council of Electronic Commerce Consultants” (EC-Council) develop?

A

Certified Ethical Hacker (CEH)

34
Q

What type of laws should a penetration tester or student learning hacking techniques be aware of?

A

All of the above

35
Q

What acronym represents the U.S. Department of Justice new branch that addresses computer crime?

A

CHIP

36
Q

What policy, provide by a typical ISP, should be read and understood before performing any port scanning outside of your private network?

A

Acceptable Use Policy

37
Q

What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web server?

A

443

38
Q

What layer protocols operate as the front end to the lower-layer protocols in the TCP/IP stack?

A

Application

39
Q

What TCP/IP protocol is used to send messages related to network operations and can be used to troubleshoot network connectivity?

A

ICMP

40
Q

What layer, in the TCP/IP stack, do applications and protocols, such as HTTP and Telnet, operate?

A

Application

41
Q

Which term best describes a hash or code pattern that antivirus software companies use to compare known viruses to every file on a computer?

A

signatures

42
Q

Malware programs cannot be detected by antivirus programs.

A

False

43
Q

What type of attack causes the victim’s computer to crash or freeze when the attacker delivers an ICMP packet that is larger than the maximum allowed 65,535 bytes?

A

Ping of Death

44
Q

When a computer hacker uses multiple compromised computers to carry out a DDOS attack, the compromised computers are usually referred to as which of the following?

A

zombies

45
Q

When a programmer exploits written code that doesn’t check for a defined amount of memory space they are executing which of the following attacks?

A

buffer overflow

46
Q

Which of the following is a text file generated by a Web server and stored on a user’s browser?

A

cookie

47
Q

Which tool can be used to gather competitive intelligence from Web sites?

A

Metis

48
Q

Namedroppers is a tool that can be used to capture Web server information and vulnerabilities in a Web site’s pages that could allow exploits such as SQL injection and buffer overflows.

A

False

49
Q

What tactic is being used when an attacker trailing closely behind an employee enters a restricted area without any security credentials by utilizing their proximity to another employee with security clearance?

A

Piggybacking

50
Q

Which utility is used to gather IP and domain information?

A

Whois

51
Q

When writing a script which statement allows you to avoid creating an endless loop in your script?

A

while

52
Q

What open-source network utility allows you to use plug-ins to run test programs (scripts) that can be selected from the client interface?

A

OpenVAS

53
Q

One of the limitations when using “ping sweeps” is that many network administrators configure nodes not to respond to ICMP Echo Requests. What type of ICMP Echo message is being disabled by these administrators?

A

reply

54
Q

What network security tool, usually included with Kali Linux, allows a user to ping multiple IP addresses?

A

Fping

55
Q

What type of port scan has the FIN, PSH, and URG flags set?

A

XMAS scan

56
Q

Which of the following is a useful enumeration tool that enables you to find out who is logged into a *nix system with one simple command?

A

Finger utility

57
Q

Which of the following commands gives you a quick way to see if there are any shared resources on a computer or server?

A

Net View

58
Q

What feature implemented in Windows Server 2016 allows for application isolation to protect applications from one another?

A

Windows Containers

59
Q

What type of Windows Server is the most likely server to be targeted by a computer hacker?

A

Domain Controller

60
Q

What feature implemented in Windows 8.1 prevents the execution of non-trusted boot content, preventing rootkits?

A

SecureBoot

61
Q

Which of the following is the act of performing a task over and over?

A

Looping

62
Q

Which of the following takes you from one area of a program (a function) to another area?

A

Branching

63
Q

Which of the following is a backdoor initiated from inside the target’s network that makes it possible to take control of the target even when it’s behind a firewall?

A

reverse shell