Solved

Match Each Term with the Correct Statement Below

Question 42

Matching

Match each term with the correct statement below.

Premises:
Created from the Web site that a user is currently viewing
Privileges that are granted to users to access hardware and software resources
Exploits previously unknown vulnerabilities so victims have no time to prepare or defend against the attacks.
Takes advantage of vulnerability in the Web application program or the Web server software so that a user can move from the root directory to other restricted directories
Targets vulnerabilities in client applications that interact with a compromised server or process malicious data
The ability to move to another directory could allow an unauthorized user to view confidential files or even enter commands to execute on a server
An attack involving using a third party to gain access rights.
Injects scripts into a Web application server that will then direct attacks at clients
Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining
Responses:
Cross-site scripting (XSS) attack
Zero day attack
Directory traversal attack
Client-side attack
Transitive access
First-party cookie
Command injection
Privilege escalation
Access rights

Correct Answer:

Created from the Web site that a user is currently viewing
Privileges that are granted to users to access hardware and software resources
Exploits previously unknown vulnerabilities so victims have no time to prepare or defend against the attacks.
Takes advantage of vulnerability in the Web application program or the Web server software so that a user can move from the root directory to other restricted directories
Targets vulnerabilities in client applications that interact with a compromised server or process malicious data
The ability to move to another directory could allow an unauthorized user to view confidential files or even enter commands to execute on a server
An attack involving using a third party to gain access rights.
Injects scripts into a Web application server that will then direct attacks at clients
Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining
Related Questions

Unlock this Answer For Free Now!

View this answer and more for free by performing one of the following actions

qr-code

Scan the QR code to install the App and get 2 free unlocks

upload documents

Unlock quizzes for free by uploading documents