Cross-Site Scripting
Code Injection
Remote Code Executions
ActiveX Controls & Java
Defending against Application Attacks
100

a vulnerability found in web applications is...

Cross-site scripting

100

an XML injection is an attack that can...

 corrupt the data

100

Vulnerabilities allow a cyber criminal to execute...

malicious code and take control of a system

100

ActiveX controls also work in...

Microsoft applications

100

The first line of defense against an application attack is to...

write solid code

200

(XSS) allows criminals to inject scripts into the web pages, which are viewed by...

 users.

200

Criminals can manipulate query's by...

programming it to suit their needs

200

 Remote code execution allows a criminal to execute any command on...

a target machine.

200

The (JVM) enables the Java program’s...

 functionality

200

 Not all programs update...

 automatically

300

 Cross-site scripting has three participants, they are called... 

criminal, the victim, and the website.

300

All sensitive data stored in the database is...

accessible to the criminals

300

Metasploit is a tool for...

developing and executing exploit code

300

There are also vulnerabilities in the...

Java class library

300

all software including operating systems and applications must be kept...

up to date

400

Criminals inject client-side scripts into web pages viewed by...

users

400

Criminals use ______ injection on websites or any SQL database.

SQL

400

Meterpreter loads and executes all of the extensions from...

memory

400

When browsing the web, some pages may not work properly unless the user installs an...

ActiveX control

400

Manual updates allow users to see exactly what _______ take place

updates

500

 If criminals obtains a victim’s session cookie, they can...

 impersonate that user.

500

There are _______ different types of databases such as  (SQL) and (XML)

 several

500

 Criminals upload and inject files into a running process on...

the target

500

Java is the second biggest security

 vulnerability next to ...

Adobe’s Flash plugin.

500

Validate all inputs as if they were...

hostile

M
e
n
u