URL, HTTP and HTML Flashcards

1
Q

What are some of the techniques used in obfuscation?

A
  • Username based obfuscation
  • %-encoding based obfuscation
  • misspelled URL’s
  • Homographic URL’s
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is username based obfuscation?

A

A username is before the url to make it look like a website eg:
\cnn.com&breaking_news@10.0.0.1/topstory.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is %-encoding based obfuscation?

A

% in a url means the next 2 characters are ASCII eg:

www%2Egoogle%2Ecom is the same as www.google.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is homographic obfuscation?

A

On or two words are spelled alike but have a different meaning eg: www.g00gle.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is obfuscation?

A

Used to deceive users into visiting a site they may not intend to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the HTTP options request?

A

Request for information about the communications options available at the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the HTTP get request?

A

Request to retrieve information resource associated with URI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the HTTP Head request?

A

Requests meta information associated with the resource without transferring the resource itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the HTTP Post request?

A

Sends data to the server in order to modify or extend the specified resource eg post to a forum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the HTTP delete request?

A

Requests the origin server delete the resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the HTTP Trace request?

A

Diagnostic method, the request is echoed back to the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the HTTP connect request?

A

Sets up a transparent channel through a proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is error 401?

A

Unauthorised access, need to enter credentials and try again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the two HTTP authentication schemes?

A

Basic - uses a base 64 encoded string which is not secure
Digest - sends a string of random data to client as a challenge. Client response with data including password and credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of a cookie?

A

So the server knows information about the client for the next time they send a request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What information is contained in a cookie?

A
  • Name
  • Value
  • Expiration date
  • Domain
  • Path
17
Q

What are cookies generally used for?

A
  • Access control (single sign on)
  • Preferences management
  • Tracking user activity
  • Maintaining session state
18
Q

How does HTTPS work?

A

Client and server establish a secure connection and communication takes place over this.

19
Q

What are potential problems with HTTPS?

A

Man in the middle attacks

20
Q

How does HTML work?

A

HTML consists of a set of tags attached to text.The tags describe the meaning and how it will be displayed.

21
Q

In HTML how is a close tag displayed?

A

with a / for eg:

22
Q

What are meta tags in HTML used for?

A

They are placed in the head of the document and contain information about the document and contain relevant keywords. Search engines often use them

23
Q

What is XML?

A

Extensible markup language

24
Q

What is the difference between HTML and XML?

A
  • HTML is used to describe how data is displayed

- XML can be used to describe what the data actually means

25
Q

What is XHTML?

A

Extensible hyper text markup language. It can be mixed with other XML languages.