PrepAway - Latest Free Exam Questions & Answers

Which of the following techniques can be bypass a user …

Which of the following techniques can be bypass a user or computer’s web browser privacy settings? (Select Two)

PrepAway - Latest Free Exam Questions & Answers

A.
SQL injection

B.
Session hijacking

C.
Cross-site scripting

D.
Locally shared objects

E.
LDAP injection

Explanation:
Session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid computer session–sometimes also called a session key — to
gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of a magic cookie used to authenticate a user
to a remote server.
Local shared objects (LSOs), commonly called Flash cookies (due to their similarities with HTTP cookies), are pieces of data that websites which use Adobe Flash
may store on a user’s computer. Flash cookies, which can be stored or retrieved whenever a user accesses a page containing a Flash application, are a form of
local storage. Similar to that of cookies, they can be used to store user preferences, save data from Flash games, or to track users’ Internet activity. LSOs have
been criticised as a breach of browser security, but there are browser settings and addons to limit the duration of their storage.

One Comment on “Which of the following techniques can be bypass a user …


Leave a Reply