Tag: technology

Questions Related to technology

  1. Looting a bank

  2. Looting email addresses, personal information

  3. Stuxnet kind of attacks

  4. Distributing virus, worms


Correct Option: D
Explanation:

To answer this question, the user needs to know what cybercrime is and what activities constitute cybercrime.

Out of the given options, looting a bank is not a cybercrime. It is a traditional crime that can be committed without the use of computers or the internet.

On the other hand, looting email addresses, personal information, distributing viruses and worms are activities that can only be carried out through the use of computers and the internet, making them cybercrimes.

Stuxnet kind of attacks is a type of cybercrime which is designed to damage or destroy specific industrial equipment. Stuxnet was used to target Iran's nuclear program, and it caused physical damage to centrifuges at a uranium enrichment plant.

Therefore, the correct answer is:

The Answer is: D. Distributing virus, worms

  1. Ping flood

  2. Request to access a non-standard port

  3. Request to access a standard port

  4. DDOS


Correct Option: D
  1. SQL injection

  2. Social engineering attacks

  3. War-dialing attack

  4. War-driving attack


Correct Option: A
  1. cross-site scripting

  2. command injection

  3. SQL injection

  4. path traversal attacks


Correct Option: D
Explanation:

To answer this question, the user needs to have knowledge about different types of web attacks.

The answer is D. Path Traversal Attacks.

Option A is incorrect because Cross-site scripting (XSS) attacks allow an attacker to inject malicious scripts into a web page viewed by other users. This allows the attacker to steal user information, hijack user accounts, spread malware, and perform other malicious activities.

Option B is incorrect because Command Injection Attacks occur when an attacker sends malicious input to an application, tricking it into executing unintended commands. This can allow the attacker to run arbitrary commands on the web server, potentially compromising the server and its data.

Option C is incorrect because SQL Injection attacks occur when an attacker sends malicious SQL statements to a web application database. This can allow the attacker to view or modify data in the database, or even take control of the entire database server.

Option D is the correct answer because Path Traversal Attacks occur when an attacker manipulates a URL to access files outside of the web server's root directory. This can allow the attacker to view sensitive data or execute arbitrary code on the web server.

  1. Client-side data validation

  2. Filtering data with a default deny regular expression

  3. Running the application under least privileges necessary

  4. Using parameterized queries to access a database


Correct Option: A
Explanation:

To solve this question, the user needs to have knowledge on securing web applications against authenticated users.

Option A: Client-side data validation is not sufficient to secure web applications against authenticated users. It can be easily bypassed by attackers, and therefore this option is not recommended.

Option B: Filtering data with a default deny regular expression can help prevent malicious input from being accepted, which is a good security practice. Therefore, this option is recommended.

Option C: Running the application under least privileges necessary is a recommended security practice because it limits the damage that can be caused by a successful attack. Therefore, this option is recommended.

Option D: Using parameterized queries to access a database can help prevent SQL injection attacks, which is a good security practice. Therefore, this option is recommended.

Therefore, the option that is NOT recommended for securing web applications against authenticated users is option A: Client-side data validation.

The Answer is: A

  1. Sufficient to secure the application

  2. Sufficient only when combined with other controls

  3. Sufficient if the passwords are longer than six characters

  4. Sufficient if none of the users have administrative access


Correct Option: B
Explanation:

To solve this question, the user needs to have knowledge of the basic principles of security controls for database applications.

Option A: This option is incorrect because securing a database application with username/password access controls alone is not sufficient to fully secure the application. Although username/password access control is an essential security measure, it is not sufficient in isolation.

Option B: This option is correct because username/password access controls are necessary but not sufficient to fully secure a database application. Other controls such as encryption, access control lists, monitoring, and auditing should be combined with username/password access controls for a complete security solution.

Option C: This option is incorrect because the length of the password alone does not guarantee the security of the database application. There are other factors to consider such as password complexity, password rotation, and password storage.

Option D: This option is incorrect because even if none of the users have administrative access, username/password access controls alone are still not sufficient to fully secure a database application.

Therefore, the correct answer is:

The Answer is: B. Sufficient only when combined with other controls

  1. Blocking access to antivirus and antispyware updates

  2. Aggregating surfing habits across multiple users for advertising

  3. Customizing search results based on an advertiser's needs

  4. All of the above


Correct Option: D
  1. Trust user supplied data.

  2. Clean and validate all user input

  3. Use GET instead of POST.

  4. Allow the use of HIDDEN form fields.


Correct Option: B
Explanation:

To improve the overall quality of web applications, developers should abide by the following rule:

B. Clean and validate all user input.

Explanation:

Option A: Trusting user-supplied data is not a good practice, as it can lead to security vulnerabilities such as injection attacks, cross-site scripting (XSS), and cross-site request forgery (CSRF).

Option B: Clean and validate all user input is a good practice that can help prevent security vulnerabilities. Input validation can help ensure that the data is in the correct format and meets the expected criteria, while input cleaning can help remove any malicious content from the user input.

Option C: Using GET instead of POST is not a rule for improving the overall quality of web applications. GET and POST are different HTTP methods used in web applications, and each has its own advantages and disadvantages. Choosing the right method depends on the requirements of the application.

Option D: Allowing the use of HIDDEN form fields is not a rule for improving the overall quality of web applications. HIDDEN form fields can be used to store data that the user cannot see or modify, but they do not provide any security benefits.

Therefore, the correct answer is:

The Answer is: B. Clean and validate all user input.

Your Windows IIS Web server has been attacked and you think the hacker has gained access to your database server that contains customer details and orders received via the Internet. What is the first thing you should do?

  1. "Spoofed" e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords

  2. A type of computer virus

  3. An example of a strong password

  4. None of the above


Correct Option: A

AI Explanation

To answer this question, you need to understand the appropriate response to a security breach. Let's go through each option to understand why it is correct or incorrect:

Option A) "Spoofed" e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames, and passwords - This option is incorrect as it describes a method used by hackers to deceive individuals into revealing their personal information. It is not the appropriate response to a security breach.

Option B) A type of computer virus - This option is incorrect as it describes a type of malware that can infect computer systems. While it is important to protect against viruses, it is not the appropriate response to a security breach.

Option C) An example of a strong password - This option is incorrect as it describes the characteristics of a strong password. While using strong passwords is important for security, it is not the appropriate response to a security breach.

Option D) None of the above - This option is correct as none of the options provided are the appropriate first response to a security breach.

The correct answer is D) None of the above. In the event of a security breach, the first thing you should do is to immediately disconnect the affected servers from the network to prevent further unauthorized access. This will help contain the breach and minimize potential damage. After disconnecting the servers, you can then proceed with investigating the breach, identifying the vulnerabilities, and implementing appropriate security measures to prevent future breaches.

  1. Attackers can use error messages to extract specific information from a system.

  2. Attackers can use unexpected errors to knock an application off line, creating a denial-of-service attack

  3. Attackers can use revealed error messages to craft more advance attacks to gain system access

  4. All of the above


Correct Option: D