I was to cross examine my answered to assure a 100% TY :-) nt and Social Network
ID: 3871045 • Letter: I
Question
I was to cross examine my answered to assure a 100% TY :-) nt and Social Networking PART 2 Secure Web- CHAPTER 6 ASSESSMENT 1. One way to verify if a system is attacked by Enabled Application Deployme 180 7. Which attack allows the attacker to delete, and modify informationhld a database and even take control of the on which the database is operating? server a brute-force attack is to periodically check the log fles A. True B. False 8. Which of the following are actual XMIltelat attacks? (Select two.) A. XMI. attribute blowup B. XML internal entities C. XML entity expression D. XML injection 2. Content spoofing tactics often include which of the following? A. Spam e-mail links B. Forum links C. Chatroom links D. A and C only E. All of the above 9. Which of the following are Web site weaknestes discussed in this chapter? (Select three.) A. OS commanding B. Improper file system permissions C. Insufficient authentication D. Fingerprinting E. Server misconfiguration 3. How do XSS attacks differ from CSRF attacks? 4. Which of the following attacks involve the use of CR and IF characters? (Select two.) A. HTTP request smuggling B. HTTP response smuggling C. HTTP request splitting D. HTTP response splitting 10. Applications hardening is the process of securing applications in use on a network. A. True B. False 5. A common path traversal attack uses which syntax sequence to attempt to locate restricted areas on a server? 11. To avoid improper input handling, which approaches can you use when handling user input? (Select three.) A. Stripping B. Sanitization C. Rejecting known bad input D. Accepting only known good input C. CR D. LF 6. During a session fixation attack, in which ways can an attacker obtain a valild session identifier? Select three.) A. Prediction B. Capture C. Fixation D. Spoofing 12. Which of the following is a strategy fot the risk of data leakage? A. Sanitization B. Strong firewall controls C. Authorization D. EncryptionExplanation / Answer
1=A( true)
2= E
3= XSS stands for Cross-Site Scripting it is a t security exploit in which a malicious hacker inserts scripts into a dynamic form
where as
CSRF stands for Cross-Site Request Forgery.A malicious attack is designed in such a way that a user sends malicious requests to the target website without having the knowledge of the attack.
4=B,D
5=A
6=B,C,D
7= Sql Injection
8= A,D
9=B,C,E
10= A(True)
11=B,C,D
12= D
Related Questions
Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.