Home
You may like this!
156.
__________ can be used to identify a web server.
  • A.
    Session hijacking
  • B.
    Banner grab
  • C.
    Traversal
  • D.
    Header analysis
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
A banner grab can be used to connect to a service and extract information about it.
Report
Name Email  
157.
In the field of IT security, the concept of defense in depth is layering more than one control on another. Why would this be helpful in the defense of a system of session hijacking?
  • A.
    To provide better protection
  • B.
    To build dependency among layers
  • C.
    To increase logging ability
  • D.
    To satisfy auditors
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Defense in depth provides much better protection than a single layer. It also provides a means of slowing down and frustrating an attacker.
Report
Name Email  
158.
Which of the following is used to set permissions on content in a website?
  • A.
    HIDS
  • B.
    ACE
  • C.
    ACL
  • D.
    ALS
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Access control lists (ACLs) are used to set permissions on web content and prevent or control certain levels of interaction by users.
Report
Name Email  
159.
What could be used to monitor application errors and violations on a web server or application?
  • A.
    HIDS
  • B.
    HIPS
  • C.
    NIDS
  • D.
    Logs
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Logs can be used to monitor activity on a system, including web applications or web servers.
Report
Name Email  
160.
Which of the following is an attribute used to secure a cookie?
  • A.
    Encrypt
  • B.
    Secure
  • C.
    HttpOnly
  • D.
    Domain
  • Answer & Explanation
  • Report
Answer : [B, C, D]
Explanation :
Each of these flags can be used to provide security for a cookie, which wouldn’t otherwise be provided.
Report
Name Email