Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

CGI programs can be written in many different programming and scripting language

ID: 3696578 • Letter: C

Question

CGI programs can be written in many different programming and scripting languages, such as C/C++, Perl, UNIX shells, Visual Basic, and FORTRAN.

A(n) ______________________________ is the name used to identify the wireless local area network (WLAN), much the same way a workgroup is used on a Windows network.

CSMA/CD is used at the data link layer on wireless networks.

ColdFusion uses its own proprietary tags written in ____.

Each frequency band contains ____; if they overlap, interference could occur.

In 802.11, an addressable unit is called a ____.

In 802.1X, a(n) ____ is the wireless user attempting access to a WLAN.

In Windows, IIS stands for ______________________________.

In the 802.11 standard, a mobile station is defined as a station that accesses the LAN while moving; a(n) ____________________ station is one that can move from location to location, but is used only while in a fixed location.

It’s possible to have a wireless network that doesn’t connect to a wired network.

Question 11

Match each term with the correct statement below.

foundation of most Web applications

main role is passing data between a Web server and Web browser

language developed by Microsoft

keeps attackers from knowing the directory structure on an IIS Web server

a Web server

stands for cross-site scripting flaw

helps beginning Web application security testers gain a better understanding of the areas covered in the OWASP top ten Web applications vulnerability list

tool for searching Web sites for CGI scripts that can be exploited

GUI tool that can be downloaded free from Microsoft and is included in the IIS Resource Kit

One of the default SSIDs used by D-Link is ____.

One of the best Web sites to find tools for hacking Web applications is ____.

SQL ____ involves the attacker supplying SQL commands when prompted to fill in a Web application field.

The 802.11 standard applies to the Physical layer of the OSI model, which deals with wireless connectivity issues of fixed, portable, and moving stations in a local area, and the Media Access Control (MAC) sublayer of the

The 802.11b standard introduced Wired Equivalent Privacy (WEP), which gave many users a false sense of security that data traversing the WLAN was protected.

Question 18

The ____ standard can achieve a throughput of 54 Mbps.

Question 19

The ____ standard has improvements to address the problem of interference.

Question 20

The ____ standard, also referred to as Wi-Fi, operates in the 2.4 GHz range with an increased throughput from 1 or 2 Mbps to 11 Mbps.

The default SSID used by Cisco is ____.

To keep attackers from knowing the directory structure you create on an IIS Web server, creating a(n) ____________________ is recommended so that the path a user sees on the Web browser is not the actual path on the Web server.

Question 23

Web servers use the ____ element in an HTML document to allow customers to submit information to the Web server.

<submit>

<dhtml>

<dynamic>

<form>

Question 24

Wireless routers are designed so that they do not interfere with wireless telephones.

Question 25

____ Project 802 was developed to create LAN and WAN standards.

IEEE

EIA/TIA

ISO

ITU-T

Question 26

____ is an enhancement to PPP.

EAP

WEP

WPA

802.1X

Question 27

____ is one of the best tools for scanning the Web for systems with CGI vulnerabilities.

Cgiscan.c

WebGoat

Wfetch

Phfscan.c

Question 28

____ is the interface that describes how a Web server passes data to a Web browser.

Perl

ASP

CGI

PHP

Question 29

____ is the most popular type of WLAN technology.

Infrared (IR)

Narrowband

Spread spectrum

Microwave

Question 30

____ is the tool most hackers wanting to access WEP-enabled WLANs use.

NetStumbler

Kismet

Wardriver

AirCrack NG

WebGoat

HTML

CGI

Cgi Scanner v1.4

Apache

Wfetch

JScript

virtual directory

XSS

      -       A.       B.       C.       D.       E.       F.       G.       H.       I.   

foundation of most Web applications

      -       A.       B.       C.       D.       E.       F.       G.       H.       I.   

main role is passing data between a Web server and Web browser

      -       A.       B.       C.       D.       E.       F.       G.       H.       I.   

language developed by Microsoft

      -       A.       B.       C.       D.       E.       F.       G.       H.       I.   

keeps attackers from knowing the directory structure on an IIS Web server

      -       A.       B.       C.       D.       E.       F.       G.       H.       I.   

a Web server

      -       A.       B.       C.       D.       E.       F.       G.       H.       I.   

stands for cross-site scripting flaw

      -       A.       B.       C.       D.       E.       F.       G.       H.       I.   

helps beginning Web application security testers gain a better understanding of the areas covered in the OWASP top ten Web applications vulnerability list

      -       A.       B.       C.       D.       E.       F.       G.       H.       I.   

tool for searching Web sites for CGI scripts that can be exploited

      -       A.       B.       C.       D.       E.       F.       G.       H.       I.   

GUI tool that can be downloaded free from Microsoft and is included in the IIS Resource Kit

One of the default SSIDs used by D-Link is ____.

One of the best Web sites to find tools for hacking Web applications is ____.

SQL ____ involves the attacker supplying SQL commands when prompted to fill in a Web application field.

The 802.11 standard applies to the Physical layer of the OSI model, which deals with wireless connectivity issues of fixed, portable, and moving stations in a local area, and the Media Access Control (MAC) sublayer of the

The 802.11b standard introduced Wired Equivalent Privacy (WEP), which gave many users a false sense of security that data traversing the WLAN was protected.

Question 18

The ____ standard can achieve a throughput of 54 Mbps.

Question 19

The ____ standard has improvements to address the problem of interference.

Question 20

The ____ standard, also referred to as Wi-Fi, operates in the 2.4 GHz range with an increased throughput from 1 or 2 Mbps to 11 Mbps.

The default SSID used by Cisco is ____.

To keep attackers from knowing the directory structure you create on an IIS Web server, creating a(n) ____________________ is recommended so that the path a user sees on the Web browser is not the actual path on the Web server.

Question 23

Web servers use the ____ element in an HTML document to allow customers to submit information to the Web server.

<submit>

<dhtml>

<dynamic>

<form>

Question 24

Wireless routers are designed so that they do not interfere with wireless telephones.

Question 25

____ Project 802 was developed to create LAN and WAN standards.

IEEE

EIA/TIA

ISO

ITU-T

Question 26

____ is an enhancement to PPP.

EAP

WEP

WPA

802.1X

Question 27

____ is one of the best tools for scanning the Web for systems with CGI vulnerabilities.

Cgiscan.c

WebGoat

Wfetch

Phfscan.c

Question 28

____ is the interface that describes how a Web server passes data to a Web browser.

Perl

ASP

CGI

PHP

Question 29

____ is the most popular type of WLAN technology.

Infrared (IR)

Narrowband

Spread spectrum

Microwave

Question 30

____ is the tool most hackers wanting to access WEP-enabled WLANs use.

NetStumbler

Kismet

Wardriver

AirCrack NG

A.

WebGoat

B.

HTML

C.

CGI

D.

Cgi Scanner v1.4

E.

Apache

F.

Wfetch

G.

JScript

H.

virtual directory

I.

XSS

Explanation / Answer

Multiple Questions with multiple sub questions : ANswering one (Question 11 Match the following)

HTML   :foundation of most Web applications
CGI    :main role is passing data between a Web server and Web browser
JScript : language developed by Microsoft
virtual directory : keeps attackers from knowing the directory structure on an IIS Web server
Apache : a Web server
XSS : stands for cross-site scripting flaw
WebGoat   :helps beginning Web application security testers gain a better understanding of the areas covered in the OWASP top ten Web applications vulnerability list
Cgi Scanner v1.4 : tool for searching Web sites for CGI scripts that can be exploited
Wfetch :GUI tool that can be downloaded free from Microsoft and is included in the IIS Resource Kit