While creating a web application, a developer adds code to limit data provided by users. The code prevents users from entering special characters. Which of the following attacks will this code MOST likely prevent?
A. Sniffing
B. Spoofing
C. XSS
D. Pharming
Answer: C. XSS
Learn More :
Cyber Security Website Attacks
- Your organization is preparing to deploy a web-based application, which will accept user input. Which of the following will test the reliability of this application to maintain availability and data integrity?
- A security tester is sending random data to a program. What does this describe?
- Your organization hosts a web site within a DMZ and the web site accesses a database server in the internal network. ACLs on firewalls prevent any connections to the database server except from the web server. Database fields holding customer data are encrypted and all data in transit between the web site server and the database server are encrypted. Which of the following represents the GREATEST risk to the data on the server?
- Which of the following is an attack against servers hosting a directory service?
- Homer recently received an email thanking him for a purchase that he did not make. He asked an administrator about it and the administrator noticed a pop-up window, which included the following code:
- Attackers have attacked an online web server using a SQL injection attack. Which of the following BEST describes this?
- An application on one of your database servers has crashed several times recently. Examining detailed debugging logs, you discover that just prior to crashing, the database application is receiving a long series of x90 characters. What is MOST likely occurring?
- While reviewing logs for a web application, a developer notices that it has crashed several times reporting a memory error. Shortly after it crashes, the logs show malicious code that isn't part of a known application. What is MOST likely occurring?
- Web developers are implementing error and exception handling in a web site application. Which of the following represents a best practice for this?
- An attacker is bypassing client-side input validation by intercepting and modifying data within the HTTP POST command. Which of the following does the attacker use in this attack?
- Which of the following developer techniques results in significant security vulnerabilities for online web site applications?
- An attacker recently attacked a web server hosted by your company. After investigation, security professionals determined that the attacker used a previously unknown application exploit. Which of the following BEST identifies this attack?
- Security analysts recently discovered that users in your organization are inadvertently installing malware on their systems after visiting the comptai.org web site. Users have a legitimate requirement to visit the comptia.org web site. What is the MOST likely explanation for this activity?
- A user complains that his system is no longer able to access the blogs.getcertifiedgetahead.com site. Instead, his browser goes to a different site. After investigation, you notice the following entries in the user's hosts file:
- An application stores user passwords in a hashed format. Which of the following can decrease the likelihood that attackers can discover these passwords?
- Which of the following is the BEST method to protect against someone trying to guess the correct PIN to withdraw money from an ATM?
- Some protocols include timestamps and sequence numbers. These components help protect against what type of attacks?
- A network administrator needs to ensure the company's network is protected against smurf attacks. What should the network administrator do?
- An IDS alerts on increased traffic. Upon investigation, you realize it is due to a spike in network traffic from several sources. Assuming this is malicious, what is the MOST likely explanation?