Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

uestion 1 (5 points) Question 1 Saved Which of the following components, when en

ID: 3764411 • Letter: U

Question

uestion 1 (5 points) Question 1 Saved Which of the following components, when enabled, allows remembering passwords in Firefox? Question 1 options: JavaScript ActiveX Chrome VBScript Save Question 2 (5 points) Question 2 Unsaved A(n) ____________ attack is carried out by tricking a user into clicking a link or submitting a form, and the code is injected into the vulnerable web server and reflected back to the user’s browser. Question 2 options: reflected obfuscation command injection stored Save Question 3 (5 points) Question 3 Unsaved What protective steps are recommended if you use Safari's AutoFill feature to auto-fill certain types of forms? Question 3 options: Use OS X FileVault along with the Use secure virtual memory option. Use OS X FileVault and check Enable “safe” files after downloading check box. Safari | Preferences | check Disable “safe” files after downloading check box. Use OS X FileVault and turn off the Use secure virtual memory option. Save Question 4 (5 points) Question 4 Unsaved This authentication method was introduced in Windows 2000 and determines the level of authentication to use based on whether or not the hosts are in the same domain. Question 4 options: integrated Windows (NTLM) authentication Kerberos authentication digest authentication negotiate authentication Save Question 5 (5 points) Question 5 Unsaved This authentication method is most suitable for intranet deployment because it works only with Internet Explorer and IIS web servers. Question 5 options: integrated Windows (NTLM) authentication basic authentication form-based authentication negotiate authentication Save Question 6 (5 points) Question 6 Unsaved A ________________ password attack uses every possible combination of letters, numbers, and symbols to attempt to guess a password. Question 6 options: dictionary hybrid parameter-manipulation brute-force Save Question 7 (5 points) Question 7 Unsaved In a(n) ________________ attack, the attacker specifies that the TCP Push control flag is set, forcing every packet into the web server’s memory, causing the attack to be delivered piece by piece, and avoiding detection. Question 7 options: buffer overflow injection fragmentation zero-day Save Question 8 (5 points) Question 8 Unsaved This tool automatically scans a computer, looking for cookies created by Internet Explorer, Mozilla Firefox, and Netscape Navigator, and then displays the data stored in each cookie. It can also delete, back up, and restore cookies. Question 8 options: Cookie Culler Cookie Viewer Cookie Scanner Cookie Explorer Save Question 9 (5 points) Question 9 Unsaved ________________ is an Internet Explorer filter that warns users about and protects against potential or known malicious websites. Question 9 options: Phishing Security Privacy Cross-Domain Save Question 10 (5 points) Question 10 Unsaved This vulnerability, discovered in Opera 9.23 and fixed in a later version of Opera, can cause arbitrary code to be executed. Question 10 options: BitTorrent Header Parsing Vulnerability JavaScript Invalid Pointer Vulnerability Redirection Information Disclosure Vulnerability Window Injection Vulnerability Save Question 11 (5 points) Question 11 Unsaved This attack takes advantage of a web application or server product being designed to accept a fixed amount data input in a form field. Question 11 options: SQL injection buffer overflow directory transversal cookies poisoning Save Question 12 (5 points) Question 12 Unsaved While testing web applications, you attempt to insert the following test script into the comment area on the company's web site:alert(“You have been hacked!”)

Explanation / Answer

Answers:

1. JavaScript

2. reflected

3. Use OS X FileVault along with the Use secure virtual memory option.

4. integrated Windows (NTLM) authentication

5. integrated Windows (NTLM) authentication

6. brute-force

7. buffer overflow

8. Cookie Viewer

9. Phishing

10. JavaScript Invalid Pointer Vulnerability

11. SQL Injection

12. Cross-site scripting