Monday, December 26, 2016

Which of the following components, when enabled, allows remembering passwords in Firefox?



  1. Which of the following components, when enabled, allows remembering passwords in Firefox?
  2. A(n) ____________ attack is carried out by tricking a user into clicking a link or submitting a form, and the code is injected into the vulnerable web server and reflected back to the user’s browser.
  3. What protective steps are recommended if you use Safari’s AutoFill feature to auto-fill certain types of forms?
  4. This authentication method was introduced in Windows 2000 and determines the level of authentication to use based on whether or not the hosts are in the same domain.
  5. This authentication method is most suitable for intranet deployment because it works only with Internet Explorer and IIS web servers.
  6. A ________________ password attack uses every possible combination of letters, numbers, and symbols to attempt to guess a password.
  7. In a(n) ________________ attack, the attacker specifies that the TCP Push control flag is set, forcing every packet into the web server’s memory, causing the attack to be delivered piece by piece, and avoiding detection.
  8. This tool automatically scans a computer, looking for cookies created by Internet Explorer, Mozilla Firefox, and Netscape Navigator, and then displays the data stored in each cookie. It can also delete, back up, and restore cookies.
  9. ________________ is an Internet Explorer filter that warns users about and protects against potential or known malicious websites.
  10. This vulnerability, discovered in Opera 9.23 and fixed in a later version of Opera, can cause arbitrary code to be executed.
  11. This attack takes advantage of a web application or server product being designed to accept a fixed amount data input in a form field.
  12. While testing web applications, you attempt to insert the following test script into the comment area on the company’s web site:
    <script>alert(“You have been hacked!”)<script>
    When you press the Submit button, a pop-up box appears on your screen with the message, “You have been hacked!” What vulnerability are you testing for in the web application?
  13. Digest authentication is similar to basic authentication, but instead of sending the username and password, the server challenges the client with a random value called a(n) _____________.
  14. A vulnerability in older versions of Internet Explorer is that the _________URL handler provides redirects for URLs.
  15. An attack that occurs during the period of time between the discovery of a vulnerability and the release of a patch by the vendor is called a(n) ________________ attack.
  16. Which of the following functions can used to defend against buffer overflows? (Select all that apply.)
  17. __________________ authentication should not be considered for any particularly rigorous definition of secure. Although the password is stored on the server in encrypted format, it is passed from the client to the server in plain text across the network.
  18. Digest authentication is considered an improvement over ________________ because it does not transmit passwords in clear text.
  19. This type of attack takes advantage of a web application’s reliance on hidden or fixed fields, such as a hidden tag in a form or a parameter in a URL.

No comments:

Post a Comment