1/8
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What type of action allows an attacker to exploit the XSS vulnerability?
Code injection
Which of the following exploits targets a protocol used for managing and accessing networked resources?
LDAP injection attack
Which type of exploit targets web applications that generate content used to store and transport data?
XML injection attack
A type of exploit that relies on overwriting contents of memory to cause unpredictable results in an application is referred to as:
Buffer overflow
A situation where an attacker intercepts and retransmits valid data exchange between an application and a server, or another application is known as:
Replay attack
Which of the following facilitate(s) privilege escalation attacks?
System/application vulnerabilities
System/application misconfigurations
Social engineering techniques
Which of the statements listed below apply to the CSRF/XSRF attack?
Exploits the trust a website has in the user's web browser
A user is tricked by an attacker into submitting unauthorized web requests
Website executes attacker's requests
A dot-dot-slash attack is also referred to as:
Directory traversal attack
Which of the following URLs is a potential indicator of a directory traversal attack?
http://www.example.com/var/../etc/passwd http://www.example.com/var/www/../../etc/passwd http://www.example.com/var/www/files/../../../etc/passwd http://www.example.com/var/www/files/images/../../../../etc/passwd