250+ Understanding Attack Vectors part-15

Que.Which of the following is not a web server attack type?
a. DOS attack
b. Website Defacement using SQLi
c. Directory Traversal
d. Password guessing
Que.______________ tool clears the log entries in the IIS log files filtered by an IP address.
a. CleanIISLoging
b. CleanLogger
c. CleanIISLog
d. ClearIISLog
Que.CleanIISLog is not a hacking tool.
a. True
b. False
c. May be True or False
d. Can’t say
Que.Which of the following is not an appropriate countermeasure for web server hacking?
a. Patch updates need to be done regularly
b. Not to use default configurations
c. Use IDS and firewalls with signature updates
d. Use low-speed internet
Que.Which of the following is not an appropriate countermeasure for web server hacking ?
a. Using OS or antivirus without updates
b. Scan web server applications for vulnerabilities
c. Using secure protocols
d. Follow strict access control policy
Que.A _______________ is a program application which is stored on a remote-server & distributed over the Internet when a user uses a browser interface to request for such applications.
a. Android application
b. Web application
c. PC application
d. Cloud application
Que.Which of the following is not an example of web application hacking?
a. Defacing websites
b. Stealing credit card information
c. Reverse engineering PC apps
d. Exploiting server-side scripting
Que._______________ hacking refers to mistreatment of applications through HTTP or HTTPS that can be done by manipulating the web application through its graphical web interface or by tampering the Uniform Resource Identifier (URI).
a. Android application
b. Web application
c. PC application
d. Cloud application
Que.Which of the following is not an appropriate method of web application hacking?
a. XSS
b. CSRF
c. SQLi
d. Brute-force
Que.XSS stands for _________________
a. Crack Site Scripting
b. Cross Site Server
c. Cross Site Scripting
d. Crack Server Scripting