|Que.Which of them is not a session hijacking tool?
|b. IP watcher
|d. Paros HTTP Hijacker
|Que.Which of the following is a session hijacking tool?
|Que.Hjksuite Tool is a collection of programs for hijacking. It contains a library called hjklib which can help in implementing TCP/IP stack-over hijacking.
|c. May be True or False
|d. Can’t say
|Que.Which of the following is not an appropriate way to compromise web servers?
|a. Misconfiguration in OS
|b. Using network vulnerabilities
|c. Misconfiguration in networks
|d. Bugs in OS which allow commands to run on web servers
|Que.Which of the following is not an appropriate method of defacing web server?
|a. Fetching credentials through MiTM
|b. Brute-forcing Admin Password
|c. IP address spoofing
|d. DNS Attack through cache poisoning
|Que.Which of the following is not an appropriate method of defacing web server ?
|a. Mail server intrusion
|b. Web application bugs
|c. Web shares misconfiguration
|d. Sessions hijacking
|Que._________ is one of the most widely used web server platforms.
|Que.IIS stands for __________________
|a. Interconnected Information Server
|b. Interconnected Information Services
|c. Internet Information Server
|d. Internet Information Services
|Que.____________ is a tiny script that if uploaded to a web server can give hacker complete control of a remote PC.
|b. ASP Trojan
|c. Web ransomware
|Que.____________ logs all the visits in log files which is located at <%systemroot%>\logfiles.
|b. Microsoft Server