250+ Understanding Attack Vectors part-14

Que.Which of them is not a session hijacking tool?
a. Juggernaut
b. IP watcher
c. Wireshark
d. Paros HTTP Hijacker
Que.Which of the following is a session hijacking tool?
a. T-Sight
b. Wireshark
c. Maltego
d. Nessus
Que.Hjksuite Tool is a collection of programs for hijacking. It contains a library called hjklib which can help in implementing TCP/IP stack-over hijacking.
a. True
b. False
c. May be True or False
d. Can’t say
Que.Which of the following is not an appropriate way to compromise web servers?
a. Misconfiguration in OS
b. Using network vulnerabilities
c. Misconfiguration in networks
d. Bugs in OS which allow commands to run on web servers
Que.Which of the following is not an appropriate method of defacing web server?
a. Fetching credentials through MiTM
b. Brute-forcing Admin Password
c. IP address spoofing
d. DNS Attack through cache poisoning
Que.Which of the following is not an appropriate method of defacing web server ?
a. Mail server intrusion
b. Web application bugs
c. Web shares misconfiguration
d. Sessions hijacking
Que._________ is one of the most widely used web server platforms.
a. IIS
b. IAS
c. ISS
d. AIS
Que.IIS stands for __________________
a. Interconnected Information Server
b. Interconnected Information Services
c. Internet Information Server
d. Internet Information Services
Que.____________ is a tiny script that if uploaded to a web server can give hacker complete control of a remote PC.
a. Spyware
b. ASP Trojan
c. Web ransomware
d. Stuxnet
Que.____________ logs all the visits in log files which is located at <%systemroot%>\logfiles.
a. IIS
b. Microsoft Server
c. Linux
d. IAS