Networking Chapter 15 Web Application Vulnerabilities Does Placing Web Server Dmz Protect From Networkborne

subject Type Homework Help
subject Pages 2
subject Words 429
subject Authors Alfred Basta, Nadine Basta, PhD CISSP CISA Mary Brown

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Chapter 15: Web Application Vulnerabilities
1. Does placing a Web server in a DMZ protect it from network-borne threats?
2. What are the five classes of attack possible on a Web server?
3. If cookies are so dangerous, why don't valid Web servers discontinue their use?
4. Can a Web server session ID be stolen over the Internet?
5. Is there any valid reason for servers to collect information about their visitors?
Indicate whether the sentence or statement is true or false.
6. ______ Wget is a tool that can be used to retrieve HTTP, HTTPS, and FTP files over the Internet.
7. ______ Namedroppers is a tool that can be used to capture Web server information and possible
vulnerabilities in a Web site's pages that could allow exploits such as SQL injection and buffer
overflows.
8. ______ Some cookies can cause security issues because unscrupulous people might store
personal information in cookies that can be used to attack a computer or server.
9. ______ To limit the amount of information a company makes public, you should have a good
understanding of what a competitor would do to discover confidential information.
page-pf2
10. ______ Network attacks often begin by gathering information from a company's Web site.
11. ______ The HTTP CONNECT method starts a remote application-layer loopback of the request
message.
Match each term with the correct statement below.
a. HTTP 400 Bad Request e. HTTP 408 Request Timeout
b. HTTP 403 Forbidden f. HTTP 500 Internal Server Error
c. HTTP 404 Not Found g. HTTP 502 Bad Gateway
d. HTTP 405 Method Not Allowed h. HTTP 503 Service Unavailable
12. ______ Request not understood by server
13. ______ Server received invalid response from upstream server
14. ______ Request not allowed for the resource
15. ______ Server is unavailable due to maintenance or overload
16. ______ Request could not be fulfilled by server
17. ______ Request not made by client in allotted time
18. ______ Server understands request but refuses to comply
19. ______ Unable to match request

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.