9.1 Web Applications

24 May 2024
4.4 (92 reviews)
12 test answers

Unlock all answers in this set

Unlock answers (8)
question
A programmer that fails to check the length of input before processing leaves his code vulnerable to what form of common attack?
answer
Buffer overflow
question
As you browse the Internet, you notice that when you go to some sites, multiple additional windows are opened automatically. Many of these windows contain advertisements for products that are inappropriate for your family to view.
answer
Pop-up blocker
question
Which type of attack is the act of exploiting a software program's free acceptance of input in order to execute arbitrary code on a target?
answer
Buffer overflow
question
Which of the following methods should you use to prevent SQL injection attacks?
answer
Perform input validation
question
What type of attack has occurred?
answer
Drive-by download
question
Having poor software development practices and failing to program input validation checks during development of custom software can result in a system vulnerable to which type of attack?
answer
Buffer overflow
question
Which of the following are subject to SQL injection attacks?
answer
Database servers
question
Which of the following is an attack that injects malicious scripts into Web pages to redirect users to fake websites or gather personal information?
answer
XSS
question
You want to prevent your browser from running JavaScript commands that are potentially harmful. Which of the following would you restrict to accomplish this?
answer
Client-side scripts
question
Which of the following attacks is a form of software exploitation that transmits or submits a longer stream of data than the input variable is designed to handle?
answer
Buffer overflow
question
An attacker is able to insert database commands in the input fields and have those commands execute on the server. Which type of attack has occurred?
answer
SQL injection
question
What is the most common attack waged against Web servers?
answer
Buffer overflow