Matching
Match each term with the correct statement below.
Premises:
Created from the Web site that a user is currently viewing
Privileges that are granted to users to access hardware and software resources
Exploits previously unknown vulnerabilities so victims have no time to prepare or defend against the attacks.
Takes advantage of vulnerability in the Web application program or the Web server software so that a user can move from the root directory to other restricted directories
Targets vulnerabilities in client applications that interact with a compromised server or process malicious data
The ability to move to another directory could allow an unauthorized user to view confidential files or even enter commands to execute on a server
An attack involving using a third party to gain access rights.
Injects scripts into a Web application server that will then direct attacks at clients
Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining
Responses:
Cross-site scripting (XSS) attack
Zero day attack
Directory traversal attack
Client-side attack
Transitive access
First-party cookie
Command injection
Privilege escalation
Access rights
Correct Answer:
Premises:
Responses:
Created from the Web site that a user is currently viewing
Privileges that are granted to users to access hardware and software resources
Exploits previously unknown vulnerabilities so victims have no time to prepare or defend against the attacks.
Takes advantage of vulnerability in the Web application program or the Web server software so that a user can move from the root directory to other restricted directories
Targets vulnerabilities in client applications that interact with a compromised server or process malicious data
The ability to move to another directory could allow an unauthorized user to view confidential files or even enter commands to execute on a server
An attack involving using a third party to gain access rights.
Injects scripts into a Web application server that will then direct attacks at clients
Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining
Premises:
Created from the Web site that a user is currently viewing
Privileges that are granted to users to access hardware and software resources
Exploits previously unknown vulnerabilities so victims have no time to prepare or defend against the attacks.
Takes advantage of vulnerability in the Web application program or the Web server software so that a user can move from the root directory to other restricted directories
Targets vulnerabilities in client applications that interact with a compromised server or process malicious data
The ability to move to another directory could allow an unauthorized user to view confidential files or even enter commands to execute on a server
An attack involving using a third party to gain access rights.
Injects scripts into a Web application server that will then direct attacks at clients
Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining
Responses:
Related Questions
Q32: When DNS servers exchange information among themselves
Q34: What does a user need to perform
Q35: Describe a drive-by-download attack.
Q36: A(n) _ is a method for adding
Q36: The predecessor to today's Internet was a
Q37: The Chinese government uses _ to prevent
Q39: Describe the differences between XML and HTML.
Q41: Explain the approach attackers use against DNS
Q47: Explain the HTTP header referrer attack.
Q48: Describe the two types of privilege escalation.
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents