Tag: security

Questions Related to security

  1. Redundant path limit was too low

  2. A parameter was not tracked

  3. Flash parsing was turned off

  4. Platform authentication was not configured


Correct Option: B

AppScan sent the following test HTTP request: GET /web/content/index.php?file=/../../../../../../../../etc/passwd%00 HTTP/1.0 Cookie: JSESSIONID=dqt0LSnfhdVyTJkCwTwfLQQSkTTGYX9D79tLLpT1yLQjVhSpZKP9!914376523; customerLanguage=en Accept: / Accept-Language: en-US User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Win32) Host: www.ibm.com Although, there is no indication in the response about the existence of a password file, AppScan reported vulnerability with the following reasoning: Global Validation found an embedded script in the response (alert(25053)), which was probably injected by a previous test. The presence of this script in the site suggests that the application is vulnerable to which type of attack?

  1. Stored Cross-site Scripting

  2. Cross-site Scripting

  3. Namazu Path Traversal

  4. Directory Listing


Correct Option: A
  1. the network layer, the web application, the webserver

  2. the operating system, the web application platform, the database

  3. the web application, the web server, the web application platform

  4. the web application platform, the network layer, the web server


Correct Option: C
  1. Redundant path limit was too low

  2. A parameter was not tracked

  3. Flash parsing was turned off

  4. Platform authentication was not configured


Correct Option: B
  1. By hacking the firewall

  2. By installing viruses on the users machine

  3. By sending malicious HTTP requests

  4. By sniffing the traffic between a user and the web server


Correct Option: C
  1. to prevent SQL injection

  2. to prevent sensitive information from being stolen

  3. to prevent cross site scripting

  4. to prevent Web site defacement


Correct Option: B
  1. steal sensitive information from other users

  2. run scripts on other user's browser

  3. alter the communication protocol used by the site

  4. can potentially understand the query's structure


Correct Option: D
Explanation:

To answer this question, the user needs to know what an SQL debug message is and how it can be exploited by an attacker.

An SQL debug message is a type of error message that can occur when there is an issue with an SQL query on a website or application. These messages can contain sensitive information about the query being executed, such as the database name, table name, and even the query itself.

Now, let's go through each option and explain why it is right or wrong:

A. steal sensitive information from other users: This option is possible because if an attacker can access the debug message, they can potentially see sensitive information about the database and query being executed. This information can be used to steal data from other users.

B. run scripts on other user's browser: This option is not directly related to an SQL debug message. It is more related to cross-site scripting (XSS) attacks, which are a different type of vulnerability.

C. alter the communication protocol used by the site: This option is not directly related to an SQL debug message. It is more related to protocol-level attacks, which are a different type of vulnerability.

D. can potentially understand the query's structure: This option is correct. An attacker who can access the SQL debug message can potentially understand the query's structure, which can be used to craft more effective SQL injection attacks.

Therefore, the correct answer is:

The Answer is: D

  1. Network firewalls cannot prevent attacks because ports 80 and 443 must be open

  2. If configured properly, network firewalls can prevent attacks

  3. Network firewalls cannot prevent attacks because its too comples to configure

  4. Network firewalls can prevent attacks because they can detect malicious HTTP traffic


Correct Option: A