. Which attack is an HTTP attack which allows attackers to access restricted directories and  execute commands outside the web servers root directory?
a. XSS attack
b. Path Traversal attack
c. MITM attack
d. SQL Injection attack

1 Answer

Answer :

d. SQL Injection attack

Related questions

Description : Which attack allows the attacker to execute the scripts on the victim’s browser? a. SSL attack b. Cookie attack c. Banner grabbing d. XSS attack

Last Answer : d. XSS attack

Description : What protocol is the Active Directory database based on? a. LDAP b. TCP c. SQL d. HTTP

Last Answer : d. HTTP

Description : Linux command to create nested directories (a directory inside a directory) -Web-Development

Last Answer : answer:

Description : Which field of cookie in WWW represents the server's directory structure by identifying the utilization of part associated with server's file tree? a. Domain b. Path c. Content d. Secure

Last Answer : b. Path

Description : Cross Site Scripting is also shortly khown as a) XSS b) HTTP c) HTTPS d) DNS

Last Answer : a) XSS

Description : ………………. is not an operation performed on linear list Get More Mcqs from http://www.siteforinfotech.com/p/mcqs.html a) Insertion b) Deletion c) Retrieval d) Traversal A) only a,b and c B) only a and b C) All of the above D) None of the above

Last Answer : D) None of the above

Description : An attackers can create an …....attack by sending hundreds or thousand of e-mail with very large attachment. a. Connection Attack b. Auto responder Attack c. Attachment overloading Attack d. All of the above

Last Answer : c. Attachment overloading Attack

Description : What is meant by a SQL injection attack? How can you prevent them from occurring in your application? 

Last Answer : SQL injection attacks occur when a malicious user attempts to execute SQL code by passing a SQL string to the application through user input. You can guard against SQL injection attacks by validating the format of all strings derived from user input that are used to form ad hoc SQL statements.

Description : Which of the following commands is used to list contents of directories? A. ls B. lp C. dir D. tar E. None of the above

Last Answer : A. ls

Description : The internet allows you to: a) Send electronic Mails b) View web pages c) Connect to servers all around the world d) All of above e) None of These

Last Answer : d) All of above

Description : The _______ is a touring problem in which each city must be visited exactly once. The aim is to find the shortest tour. a) Finding shortest path between a source and a destination b) Travelling ... c) Map coloring problem d) Depth first search traversal on a given map represented as a graph

Last Answer : b) Travelling Salesman problem

Description : _______ allows servers and storage devices to increasingly share and utilize applications by easy migration from one server to another a) Grid Computing b) Artificial Intelligence c) Virtualization d) Web 3.0

Last Answer : Virtualization

Description : Which of the following commands is used to display the directory attributes rather than its contents? A. ls -l -d B. ls -l C. ls -x D. ls -F E. None of the above

Last Answer : A. ls -l -d

Description : How could you execute DDL commands, such as ALTER or CREATE TABLE, against a database with ADO.NET?

Last Answer : You must use a Command object to execute DDL commands. You can set the CommandType property to Text and enter the appropriate DDL command in the CommandText property. Then call Command.ExecuteNonQuery to execute the command.

Description : Level order Traversal of a rooted Tree can be done by starting from root and performing: (A) Breadth First Search (B) Depth first search (C) Root search (D) Deep search

Last Answer : (A) Breadth First Search

Description : In Computer Networking, HTTP is referred to as a stateless protocol as servers do not maintain any information about past client requests. HTTP is an acronym for (A) Hyper Text Translation ... ) Hyper Text Transfer Protocol (C) High TeraByte Transfer Protocol (D) Hypervisor Test Translation Protocol

Last Answer : (B) Hyper Text Transfer Protocol

Description : Google cloud SQL Features a) Lets your application read files from and write files to buckets in Google cloud storage b) A Fully -managed web service that allows you to create , ... large applications into logical components that can be share stateful services and communicate in secure fashion.

Last Answer : A Fully –managed web service that allows you to create , configure , and use relational databases that live in Google’s cloud

Description : What is the purpose of a Denial of Service attack? a. Exploit a weakness in the TCP/IP stack b. To execute a Trojan on a system c. To overload a system so it is no longer operational d. To shutdown services by turning them off

Last Answer : c. To overload a system so it is no longer operational

Description : . What does HTTP do? A. Enables network resources and reduces perception of latency B. Reduces perception of latency and allows multiple concurrency exchange C. Allows multiple concurrent ... D. Enables network resources and reduces perception of latency and Allows multiple concurrent exchange.

Last Answer : D. Enables network resources and reduces perception of latency and Allows multiple concurrent exchange.

Description : _________ allows us to control electronic components a) RETful API b) RESTful API c) HTTP

Last Answer : a) RETful API

Description : Does OpenOffice support all the standard SQL commands?

Last Answer : http://www.google.com/#hl=en&q=openoffice+sql+functions

Description : With reference to the above given tables, write commands in SQL for (i) and (ii) and output for (iii) below: -Technology

Last Answer : (i) select TName, Passenger from Train T, Reservation R where T.TrainId=R.TrainId;(ii) select T.* from Train T, Reservation R where T.TrainId!=R.TrainId;(iii)TrainIdTNameSourceDestination3424Lucknow MailLucknowNew Delhi5400Century ExpressNew DelhiKanpur

Description : Consider the following table Furniture. Write SQL commands for the statements (i) to (viii) and write output for SQL queries (ix) and (x). -Technology

Last Answer : SQL commands for the given statements (i) to (viii) ;1. SELECT FCODE, NAME. PRICE FROM Furniture WHERE PRICE < 5000;2. SELECT NAME. PRICE FROM Furniture3.4. WHERE NAME LIKE %table% ;5. SELECT DISTINCT WCODE ... ;15.16. Output for SQL queries (ix) and (x)(ix)SUM(PRICE)6500(x)COUNT(DISTINCT PRICE)5

Description : Write SQL Query commands based on the following table: -Technology

Last Answer : This answer was deleted by our moderators...

Description : Consider the decimal number x with value 8459.2654. Write commands in SQL to: i. round it off to a whole number -Technology

Last Answer : i. select round(8459.2654);ii.select round(8459.2654,-2);

Description : Consider the following SQL string: “Preoccupied” Write commands to display: (a)“occupied” (b)“cup” -Technology

Last Answer : commands to display:(a)“occupied” (b)“cup”

Description : Considering the same string “Preoccupied” Write SQL commands to display: (a) the position of the substring ‘cup’ in the string “Preoccupied” -Technology

Last Answer : (a)select instr 'Preoccupied' , ‘ 'cup'));(b)select left 'Preoccupied',4);

Description : What is JDBC? Describe the steps needed to execute a SQL query using JDBC.

Last Answer : Ans. The JDBC is a pure Java API used to execute SQL statements. It provides a set of classes and interfaces that can be used by developers to write database applications. The steps needed to execute a ... . 2. Execute a SQL statement. 3. Process th results. 4. Close the connection to the database.

Description : Consider the following two commands C1 and C2 on the relation R from an SQL database:  C1: drop table R; C2: delete from R; Which of the following statements is TRUE? I. Both C1 and C2 delete the schema for R. II. C2 ... R. (A) I only (B) I and II only (C) II and III only (D) I, II and III

Last Answer : (C) II and III only

Description : Suppose you are browsing the world wide web using a web browser and trying to access the web servers. What is the underlying protocol and port number that are being used? a. UDP, 80 b. TCP, 80 c. TCP, 25 d. UDP, 25

Last Answer : b. TCP, 80

Description : Which statement is true about a cloud computing environment? A. It cannot be used to host location based applications. B. It enables users to access systems regardless of their location. C. It introduces ... D. It can improve a web server response time by having servers closer to the end user.

Last Answer : It enables users to access systems regardless of their location.

Description : Malicious users are also called as : a. External attackers b. Trusted users c. hacker d. Internal attackers

Last Answer : d. Internal attackers

Description : The ability to find an individual item in a file immediately _____ is used. 1) File allocation table 2) Directory 3) Sequential access 4) Direct access 4 5) None of these

Last Answer : Answer :1

Description : The ability to find an individual item in a file immediately _____ is used: a) file allocation table b) directory c) sequential access d) direct access e) None of The Above

Last Answer : a) file allocation table

Description : A ..... contains buttons and menus that provide quick access to commonly used commands. 1) Menu Bar 2) Toolbar 3) Window 4) Action Bar

Last Answer : 2) Toolbar

Description : Will SQL training teach me how to do SQL injection on websites?

Last Answer : No, it will not. SQL injections are primarily used for malicious purposes, and will not be specifically taught in a legitimate SQL training course. You would, however, probably gain the knowledge ... how to deal with SQL databases with websites. You will also learn how to design databaseses.

Description : 4 Which is the top most directory in the server file system A)Root Directory

Last Answer : A)Root Directory

Description : Which is the top most directory in the server file system A)Root Directory

Last Answer : A)Root Directory

Description : Is there a wepage design suite that is free, easy to use and allows content to be exported to html and uploaded to user-determined servers?

Last Answer : If you already have Microsoft Office you can use their web utilities.

Description : Which of the following statement is true about virtualization technology? A. Allows manual provisioning of environments. B. Administrationsoftware constantly monitors the software. C. Save energy by powering off the servers. D. Allows automatic deployment of applications.

Last Answer : Allows automatic deployment of applications.

Description : Identify the DBMS among the following. (1) MS-Access (2) MS-Power Point (3) PL/SQL (4) MS-Excel

Last Answer : PL/SQL

Description : Debugger is a program that (A) allows to examine and modify the contents of registers (B) does not allow execution of a segment of program (C) allows to set breakpoints, execute a segment of program and display contents of register (D) All of the above

Last Answer : (C) allows to set breakpoints, execute a segment of program and display contents of register

Description : Data (information) is stored in computer as ________: a) Directories b) Files c) Floppies d) Matter e) None of The Above

Last Answer : b) Files

Description : Data (information) is stored in computers as- 1) Files 2) Directories 3) Floppies 4) Matter

Last Answer : 1) Files

Description : Which switch should be used in the DIR command to view files in all directories ? 1) /P 2) /W 3) /S 4) /L

Last Answer : 3) /S

Description : Which switch should be used in the DIR command to view files in all directories ? 1 /P 2 /W 3 /S 4 /L

Last Answer : 3 /S

Description : What is the best way to fix an XSS problem in a website?

Last Answer : Generally speaking, you scrub all input from users and escape it everywhere it might be displayed. Without more details I can’t give a more detailed answer.

Description : During the installation of SAP XSS you have to select the Usage Types that should be installedWhich Usage Types are necessary for the installation of SAP XSS? Note: there are 2 correct answered ... . Utilities Customer E-Services B. Enterprise Portal C. Adobe Document Services D. Self Services

Last Answer : D. Self Services

Description : Which allows for a simple and matrix implementation of all the basic algorithm? a) HMM b) Restricted structure of HMM c) Temporary model

Last Answer : b) Restricted structure of HMM