02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

430 Appendix A ■ Answers to Review Questions<br />

13. A. Web applications can be vulnerable to session fixation if the right conditions exist. Typically<br />

this means that session IDs are not regenerated often enough or can be easily ascertained.<br />

14. C. Authentication mechanisms such as Kerberos can provide protection against session<br />

hijacking. Authentication provides verification of the party or parties involved in the communication.<br />

15. C. XSS is targeted toward web browsers and can take advantage of defects in web applications<br />

and browsers.<br />

16. D. Trojans are commonly used to deploy malware onto a client system, which can be used<br />

to perform a session hijack.<br />

17. C. A man-in-the-middle attack is where the attacking party inserts themselves into the communication<br />

between two different parties.<br />

18. A. Session hijacks can occur with both network and application traffic, depending on the<br />

attacker’s desired goals.<br />

19. D. Cookies can be used during a session hijack and indeed the information contained<br />

therein may be the goal of the attack, but devices alone cannot initiate an attack.<br />

20. D. A session hijack can be used to read cookies on a client but not on a server.<br />

Chapter 13: Web Servers and Web<br />

Applications<br />

1. B. A web application is code designed to be run on the server with the results sent to the<br />

client for presentation.<br />

2. A. JavaScript is a client-side scripting language as opposed to languages such as ASP and<br />

ASP.NET.<br />

3. B. PHP is a server-side language that has its actions handled by the server before delivering<br />

the results to the requester.<br />

4. D. Directory traversals are used to browse outside the root of the site or location and access<br />

files or directories that should otherwise be hidden.<br />

5. B. Input validation is the process of checking input for correctness prior to its being<br />

accepted by an application. Unlike filtering, which works on the server side, validation<br />

works on the client side and prevents bad input from making it to the server.<br />

6. B. A banner grab can be used to connect to a service and extract information about it.<br />

7. A. Defense in depth provides much better protection than a single layer. It also provides a<br />

means of slowing down and frustrating an attacker.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!