PrepAway - Latest Free Exam Questions & Answers

Tag: 312-50

What vulnerability is detected in the web application here?

While testing web applications, you attempt to insert the following test script into the search area on the company’s web site:

<script>alert(‘Testing Testing Testing’)</script>

Afterwards, when you press the search button, a pop up box appears on your screen with the text "Testing Testing Testing". What vulnerability is detected in the web application here?

What are some common vulnerabilities in web applications that he should be concerned about?

Bret is a web application administrator and has just read that there are a number of surprisingly common web application vulnerabilities that can be exploited by unsophisticated attackers with easily available tools on the Internet.

He has also read that when an organization deploys a web application, they invite the world to send HTTP requests. Attacks buried in these requests sail past firewalls, filters, platform hardening, SSL, and IDS without notice because they are inside legal HTTP requests. Bret is determined to weed out any vulnerabilities. What are some common vulnerabilities in web applications that he should be concerned about?

What kind of assessment will you be performing ?

You have just received an assignment for an assessment at a company site. Company’s management is concerned about external threat and wants to take appropriate steps to insure security is in place. Anyway the management is also worried about possible threats coming from inside the site, specifically from employees belonging to different Departments. What kind of assessment will you be performing ?

What would be the best method to accurately identify the services running on a victim host?

Scanning for services is an easy job for Bob as there are so many tools available from the Internet. In order for him to check the vulnerability of company, he went through a few scanners that are currently available. Here are the scanners that he uses:

– Axent’s NetRecon (http://www.axent.com)
– SARA, by Advanced Research Organization (http://www-arc.com/sara)
– VLAD the Scanner, by Razor (http://razor.bindview.com/tools/)

However, there are many other alternative ways to make sure that the services that have been scanned will be more accurate and detailed for Bob.

What would be the best method to accurately identify the services running on a victim host?


Page 123 of 150« First...102030...121122123124125...130140150...Last »