QUESTION 3 To prevent XSS attacks any user supplied input should be examined and
ID: 3712099 • Letter: Q
Question
QUESTION 3 To prevent XSS attacks any user supplied input should be examined and any dangerous code removed or escaped to block its execution. O True False QUESTION 4 is a program flaw that occurs when program input data can accidentally or deliberately influence the flow of execution of the program PHP attack Format string injection attack XSS attack Injection attack QUESTION 5 attack occurs when the input is used in the construction of a command that is subsequently executed by the system with the privileges of the Web server command injection SQL injection code injection PHP remote code injection QUESTION 6 attack is where the input includes code that is then executed by the attacked systenm SQL injection cross-site scripting code injection interpreter injectionExplanation / Answer
QUESTION 3
To prevent XSS attacks any user supplied input should be examined and any dangerous code removed or escaped to block its execution
Answer: True
Explanation: Cross-Site Scripting (XSS) vulnerability; Cross-Site Tracing attacks the web server whereas XSS attacks the web application.
QUESTION 4
_______ is a program flaw that occurs when program input data can accidentally or deliberately influence the flow of execution of the program.
Answer: Option d) Injection attack
QUESTION 5
A ______ attack occurs when the input is used in the construction of a command that is subsequently executed by the system with the privileges of the Web server.
Answer: Option a) command injection
QUESTION 6
A _____ attack is where the input includes code that is then executed by the attacked system.
Answer: Option c) code injection
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.