CGI programs can be written in many different programming and scripting language
ID: 3696578 • Letter: C
Question
CGI programs can be written in many different programming and scripting languages, such as C/C++, Perl, UNIX shells, Visual Basic, and FORTRAN.
A(n) ______________________________ is the name used to identify the wireless local area network (WLAN), much the same way a workgroup is used on a Windows network.
CSMA/CD is used at the data link layer on wireless networks.
ColdFusion uses its own proprietary tags written in ____.
Each frequency band contains ____; if they overlap, interference could occur.
In 802.11, an addressable unit is called a ____.
In 802.1X, a(n) ____ is the wireless user attempting access to a WLAN.
In Windows, IIS stands for ______________________________.
In the 802.11 standard, a mobile station is defined as a station that accesses the LAN while moving; a(n) ____________________ station is one that can move from location to location, but is used only while in a fixed location.
It’s possible to have a wireless network that doesn’t connect to a wired network.
Question 11
Match each term with the correct statement below.
foundation of most Web applications
main role is passing data between a Web server and Web browser
language developed by Microsoft
keeps attackers from knowing the directory structure on an IIS Web server
a Web server
stands for cross-site scripting flaw
helps beginning Web application security testers gain a better understanding of the areas covered in the OWASP top ten Web applications vulnerability list
tool for searching Web sites for CGI scripts that can be exploited
GUI tool that can be downloaded free from Microsoft and is included in the IIS Resource Kit
One of the default SSIDs used by D-Link is ____.
One of the best Web sites to find tools for hacking Web applications is ____.
SQL ____ involves the attacker supplying SQL commands when prompted to fill in a Web application field.
The 802.11 standard applies to the Physical layer of the OSI model, which deals with wireless connectivity issues of fixed, portable, and moving stations in a local area, and the Media Access Control (MAC) sublayer of the
The 802.11b standard introduced Wired Equivalent Privacy (WEP), which gave many users a false sense of security that data traversing the WLAN was protected.
Question 18
The ____ standard can achieve a throughput of 54 Mbps.
Question 19
The ____ standard has improvements to address the problem of interference.
Question 20
The ____ standard, also referred to as Wi-Fi, operates in the 2.4 GHz range with an increased throughput from 1 or 2 Mbps to 11 Mbps.
The default SSID used by Cisco is ____.
To keep attackers from knowing the directory structure you create on an IIS Web server, creating a(n) ____________________ is recommended so that the path a user sees on the Web browser is not the actual path on the Web server.
Question 23
Web servers use the ____ element in an HTML document to allow customers to submit information to the Web server.
<submit>
<dhtml>
<dynamic>
<form>
Question 24
Wireless routers are designed so that they do not interfere with wireless telephones.
Question 25
____ Project 802 was developed to create LAN and WAN standards.
IEEE
EIA/TIA
ISO
ITU-T
Question 26
____ is an enhancement to PPP.
EAP
WEP
WPA
802.1X
Question 27
____ is one of the best tools for scanning the Web for systems with CGI vulnerabilities.
Cgiscan.c
WebGoat
Wfetch
Phfscan.c
Question 28
____ is the interface that describes how a Web server passes data to a Web browser.
Perl
ASP
CGI
PHP
Question 29
____ is the most popular type of WLAN technology.
Infrared (IR)
Narrowband
Spread spectrum
Microwave
Question 30
____ is the tool most hackers wanting to access WEP-enabled WLANs use.
NetStumbler
Kismet
Wardriver
AirCrack NG
WebGoat
HTML
CGI
Cgi Scanner v1.4
Apache
Wfetch
JScript
virtual directory
XSS
- A. B. C. D. E. F. G. H. I.foundation of most Web applications
- A. B. C. D. E. F. G. H. I.main role is passing data between a Web server and Web browser
- A. B. C. D. E. F. G. H. I.language developed by Microsoft
- A. B. C. D. E. F. G. H. I.keeps attackers from knowing the directory structure on an IIS Web server
- A. B. C. D. E. F. G. H. I.a Web server
- A. B. C. D. E. F. G. H. I.stands for cross-site scripting flaw
- A. B. C. D. E. F. G. H. I.helps beginning Web application security testers gain a better understanding of the areas covered in the OWASP top ten Web applications vulnerability list
- A. B. C. D. E. F. G. H. I.tool for searching Web sites for CGI scripts that can be exploited
- A. B. C. D. E. F. G. H. I.GUI tool that can be downloaded free from Microsoft and is included in the IIS Resource Kit
One of the default SSIDs used by D-Link is ____.
One of the best Web sites to find tools for hacking Web applications is ____.
SQL ____ involves the attacker supplying SQL commands when prompted to fill in a Web application field.
The 802.11 standard applies to the Physical layer of the OSI model, which deals with wireless connectivity issues of fixed, portable, and moving stations in a local area, and the Media Access Control (MAC) sublayer of the
The 802.11b standard introduced Wired Equivalent Privacy (WEP), which gave many users a false sense of security that data traversing the WLAN was protected.
Question 18
The ____ standard can achieve a throughput of 54 Mbps.
Question 19
The ____ standard has improvements to address the problem of interference.
Question 20
The ____ standard, also referred to as Wi-Fi, operates in the 2.4 GHz range with an increased throughput from 1 or 2 Mbps to 11 Mbps.
The default SSID used by Cisco is ____.
To keep attackers from knowing the directory structure you create on an IIS Web server, creating a(n) ____________________ is recommended so that the path a user sees on the Web browser is not the actual path on the Web server.
Question 23
Web servers use the ____ element in an HTML document to allow customers to submit information to the Web server.
<submit>
<dhtml>
<dynamic>
<form>
Question 24
Wireless routers are designed so that they do not interfere with wireless telephones.
Question 25
____ Project 802 was developed to create LAN and WAN standards.
IEEE
EIA/TIA
ISO
ITU-T
Question 26
____ is an enhancement to PPP.
EAP
WEP
WPA
802.1X
Question 27
____ is one of the best tools for scanning the Web for systems with CGI vulnerabilities.
Cgiscan.c
WebGoat
Wfetch
Phfscan.c
Question 28
____ is the interface that describes how a Web server passes data to a Web browser.
Perl
ASP
CGI
PHP
Question 29
____ is the most popular type of WLAN technology.
Infrared (IR)
Narrowband
Spread spectrum
Microwave
Question 30
____ is the tool most hackers wanting to access WEP-enabled WLANs use.
NetStumbler
Kismet
Wardriver
AirCrack NG
A.WebGoat
B.HTML
C.CGI
D.Cgi Scanner v1.4
E.Apache
F.Wfetch
G.JScript
H.virtual directory
I.XSS
Explanation / Answer
Multiple Questions with multiple sub questions : ANswering one (Question 11 Match the following)
HTML :foundation of most Web applications
CGI :main role is passing data between a Web server and Web browser
JScript : language developed by Microsoft
virtual directory : keeps attackers from knowing the directory structure on an IIS Web server
Apache : a Web server
XSS : stands for cross-site scripting flaw
WebGoat :helps beginning Web application security testers gain a better understanding of the areas covered in the OWASP top ten Web applications vulnerability list
Cgi Scanner v1.4 : tool for searching Web sites for CGI scripts that can be exploited
Wfetch :GUI tool that can be downloaded free from Microsoft and is included in the IIS Resource Kit
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.