Module 13 - Hacking Web Servers ( EC Mode ) Flashcards
Which of the following is a web-server component that provides storage on a different machine or disk after the original disk is filled up?
A. Document root
B. Virtual document tree
C. Virtual hosting
D. Server root
Answer: B. Virtual document tree
Which of the following is a type of attack in which the attacker alters or deletes the data of a web server and replaces the data with malware?
A. Website defacement
B. Data tampering
C. Compromise of user accounts
D. Data theft
Answer: A. Website defacement
Which of the following technologies belongs to the application layer and is used to generate dynamic web content?
A. Apache
B. PHP
C. MySQL
D. Linux
Answer: B. PHP
Which of the following techniques makes a web server vulnerable to attacks?
A. Running unhardened applications and servers
B. Blocking unrestricted internal and outbound traffic
C. Using different system administrator credentials everywhere
D. Regularly updating the web server with the latest patches
Answer: A. Running unhardened applications and servers
Which of the following types of damage is caused when attackers access sensitive data such as financial records, future plans, and the source code of a program?
A. Data theft
B. Website defacement
C. Data tampering
D. Damage of the reputation of the company
Answer: A. Data theft
Identify the component of the web server that provides storage on a different machine or a disk after the original disk is filled-up?
A. Document root
B. Virtual hosting
C. Virtual document tree
D. Server root
Answer: C. Virtual document tree
Which of the following stores critical HTML files related to the webpages of a domain name that will be served in response to requests?
A. Document root
B. Virtual document tree
C. Web proxy
D. Server root
Answer: A. Document root
Which of the following stores a server’s configuration, error, executable, and log files?
A. Web proxy
B. Server root
C. Virtual document tree
D. Document root
Answer: B. Server root
Which of the following provides storage on a different machine or disk after the original disk is filled up?
A. Virtual document tree
B. Document root
C. Server root
D. Virtual hosting
Answer: A. Virtual document tree
In which of the following attack types does an attacker exploit the trust of an authenticated user to pass malicious code or commands to a web server?
A. Cross-site request forgery
B. Cross-site scripting
C. Unvalidated input and file injection
D. SQL injection attack
Answer: A. Cross-site request forgery
In which of the following attacks does an attacker attempt to access sensitive information by intercepting and altering communications between an end user and a web server?
A. Website defacement attack
B. HTTP response splitting attack
C. Phishing attack
D. Man-in-the-middle attack
Answer: D. Man-in-the-middle attack
In which of the following attack types does an attacker alter the visual appearance of a web page by injecting code to add image popups or text?
A. Server-side request forgery
B. Website defacement
C. Web-server misconfiguration
D. Web cache poisoning
Answer: B. Website defacement
In which of the following attack types does an attacker flood an application with an excess amount of data so that the application may crash or exhibit vulnerable behavior?
A. Parameter/form tampering
B. Denial-of-service attack
C. Directory traversal
D. Buffer overflow attack
Answer: D. Buffer overflow attack
In which of the following attack types does an attacker modify the content of a web page by examining its HTML code and identifying form fields that lack valid constraints?
A. Cross-site scripting (XSS) attack
B. Buffer overflow attack
C. Command injection attack
D. Directory traversal
Answer: C. Command injection attack
An attacker sends numerous fake requests to the webserver from various random systems that results in the webserver crashing or becoming unavailable to the legitimate users. Which attack did the attacker perform?
A. DNS amplification attack
B. HTTP response splitting attack
C. DNS server hijacking
D. DoS attack
Answer: D. DoS attack
If an attacker compromises a DNS server and changes the DNS settings so that all the requests coming to the target webserver are redirected to his/her own malicious server, then which attack did he perform?
A. DNS server hijacking
B. DoS attack
C. DNS amplification attack
D. HTTP response splitting attack
Answer: A. DNS server hijacking
Which of the following attacks allows an attacker to access sensitive information by intercepting and altering communications between an end user and webservers?
A. Directory traversal attack
B. DoS attack
C. Man-in-the-middle attack
D. HTTP response splitting attack
Answer: C. Man-in-the-middle attack
Which of the following attacks occurs when an intruder maliciously alters the visual appearance of a webpage by inserting or substituting provocative, and frequently, offending data?
A. Directory traversal attack
B. Man-in-the-middle attack
C. Website defacement
D. HTTP response splitting attack
Answer: C. Website defacement
Which of the following is not a session hijacking technique?
A. Session fixation
B. DNS hijacking
C. Cross-site scripting
D. Session sidejacking
Answer: B. DNS hijacking
The security analyst for Danels Company arrives this morning to his office and verifies the primary home page of the company. He notes that the page has the logo of the competition and writings that do not correspond to the true page. What kind of attack do the observed signals correspond to?
A. Phishing
B. DDoS
C. HTTP attack
D. Defacement
Answer: D. Defacement
Which of the following is a lookup database for default passwords, credentials, and ports?
A. Open Sez Me
B. ID Serve
C. Netcraft
D. NCollector Studio
Answer: A. Open Sez Me
Which of the following tools is a simple Internet server identification utility that is capable of performing reverse DNS lookup and HTTP server identification?
A. Dylib Hijack Scanner
B. ID Serve
C. OllyDbg
D. NCollector Studio
Answer: B. ID Serve