a vulnerability found in web applications is...
Cross-site scripting
an XML injection is an attack that can...
corrupt the data
Vulnerabilities allow a cyber criminal to execute...
malicious code and take control of a system
ActiveX controls also work in...
Microsoft applications
The first line of defense against an application attack is to...
write solid code
(XSS) allows criminals to inject scripts into the web pages, which are viewed by...
users.
Criminals can manipulate query's by...
programming it to suit their needs
Remote code execution allows a criminal to execute any command on...
a target machine.
The (JVM) enables the Java program’s...
functionality
Not all programs update...
automatically
Cross-site scripting has three participants, they are called...
criminal, the victim, and the website.
All sensitive data stored in the database is...
accessible to the criminals
Metasploit is a tool for...
developing and executing exploit code
There are also vulnerabilities in the...
Java class library
all software including operating systems and applications must be kept...
up to date
Criminals inject client-side scripts into web pages viewed by...
users
Criminals use ______ injection on websites or any SQL database.
SQL
Meterpreter loads and executes all of the extensions from...
memory
When browsing the web, some pages may not work properly unless the user installs an...
ActiveX control
Manual updates allow users to see exactly what _______ take place
updates
If criminals obtains a victim’s session cookie, they can...
impersonate that user.
There are _______ different types of databases such as (SQL) and (XML)
several
Criminals upload and inject files into a running process on...
the target
Java is the second biggest security
vulnerability next to ...
Adobe’s Flash plugin.
Validate all inputs as if they were...
hostile