PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following injection flaws involves the injection of malicious code through a web application?

Injection flaws are web application vulnerabilities that allow untrusted data to be Interpreted and
executed as part of a command or query. Attackers exploit injection flaws by constructing
malicious commands or queries that result in data loss or corruption, lack of accountability, or
denial of access. Which of the following injection flaws involves the injection of malicious code
through a web application?

192.168.100.150, -, 03/6/11, 8:45:30, W3SVC2, SERVER, 172.15.10.30, 4210, 125, 3524, 100, 0, GET, /dollerlogo.

The IIS log file format is a fixed (cannot be customized) ASCII text-based format. The IIS format
includes basic items, such as client IP address, user name, date and time, service and instance,
server name and IP address, request type, target of operation, etc. Identify the service status code
from the following IIS log.
192.168.100.150, -, 03/6/11, 8:45:30, W3SVC2, SERVER, 172.15.10.30, 4210, 125, 3524, 100, 0,
GET, /dollerlogo.gif,

Which of the following layer in web services stack is vulnerable to fault code leaks?

The evolution of web services and their increasing use in business offers new attack vectors in an
application framework. Web services are based on XML protocols such as web Services Definition
Language (WSDL) for describing the connection points, Universal Description, Discovery, and
Integration (UDDI) for the description and discovery of Web services and Simple Object Access
Protocol (SOAP) for communication between Web services that are vulnerable to various web
application threats. Which of the following layer in web services stack is vulnerable to fault code
leaks?


Page 455 of 555« First...102030...453454455456457...460470480...Last »