A user finds out major changes in the content of a regular website, that only used to change once in a blue moon. He clears all the information stored in the browser and finds out the things were back to normal. What vulnerability he has been victim of?
Browser cache poisoning.
Reflected Cross-site Scripting.
Persistent Cross-site scripting.
Link Injection.
A user finds out his personal information were used on a website where he never registered. Which case would be close to this scenario?
Information Stealth.
Sensitive Information Disclosure.
Identity Theft.
Cross-site scripting by MIME sniffing.
A user is able to view the backup files of a website, while browsing the site.
Configuration Management.
Input validation.
Vulnerable Cookie.
The amount and the item_id of bid is sent via the URL parameter in a bidding website, a user A sends same link to another user B with the manipulated parameter values, after clicking it the other user B finds out later that a bid has been placed on his behalf.
Identity theft.
XML Injection.
Reflected cross-site scripting.
Cross-site request forgery.
?
Session fixation.
Privilege escalation.
Name the attack: link to a fake website
keylogger
brute force
phishing
e-mail spoofing
Redirecting the traffic to a fake website by changing the details in user DNS
Session hijacking
Phishing
Pharming
MAC spoofing
Virtual Keyboard helps us to escape from which of the following attacks?
pharming
session hijacking
Keylogger
Which of the below attacks have no solution?
trojan-horse
Social engineering
Virus combined with a useful software is called as____________
worm
Trojan-horse
script injection
DOS attack