250+ Understanding Attack Vectors part-16

Que.Which of the following is not a threat of web application?
a. Reverse engineering
b. Command injection
c. DMZ protocol attack
d. Buffer Overflow
Que.Which of the following is not a threat of web application ?
a. Session poisoning
b. Phishing
c. Cryptographic interception
d. Cookie snooping
Que.________ Injection attack is a special attack done through character elements “Carriage Return” or “Line Feed.” Exploitation can be done when an attacker is capable to inject a CRLF series in an HTTP stream.
a. XSS
b. CSRF
c. CRLF
d. SQL
Que.Which of the following scripting language is used for injecting executable malicious code for web-app hacking?
a. C++
b. Tcl
c. Frame-Script
d. JavaScript
Que.______________ takes advantage if hidden fields that work as the only security measure in some applications.
a. Parameter tampering
b. Data tampering
c. Tampering of network topology
d. Protocol tampering
Que._____________ is the attack method for decoding user credentials. Using this technique an attacker can log on as a user & gain access to unauthorized data.
a. Cache Snooping
b. Cookie-jacking
c. Cookie Snooping
d. Cache-compromising
Que.Which of the following is not an example of web application hacking technique?
a. LDAP injection
b. Cryptanalysis
c. Race condition attack
d. OS command injection.
Que._____________ are unwanted software intended to pitch advertisements upon the user’s screen, most often within a web browser.
a. Shareware
b. Adware
c. Bloatware
d. Ransomware
Que.PUP is abbreviated as ____________
a. Potentially Useless Programs
b. Potentially Unwanted Protocols
c. Potentially Unwanted Programs
d. Partial Unwanted Programs
Que.Users might invite some bogus virus in his/her system by clicking the ____________
a. Shareware
b. Spyware
c. URL
d. Adware

Get code60