___ ______ is a computer system that stores, processes and delivers web pages to clients via HTTP.
a. DNS Server
b. Web Server
c. Exchange Server
d. SCCM Server
b. Web Server
Web Server Concepts:
Internet Information Services (IIS) is used on which system?
a. Linux
b. Unix
c. Solaris
d. Microsoft
d. Microsoft
Web Server Concepts:
Apache web services are used on which system?
a. Linux
b. Unix
c. Solaris
d. Microsoft
a. Linux
Web Server Attacks:
c. DNS Amplification Attack
Web Server Attacks:
a. DNS Attack
Web Server Attacks:
Attackers gain access to restricted directories outside of the web server root directory.
a. DNS Attack
b. Directory Traversal Attack
c. DNS Amplification Attack
d. Man-in-the-Middle Attack (MITM)
b. Directory Traversal Attack
Web Server Attacks:
d. Man-in-the-Middle Attack
Web Server Attack Methodology:
Implement _____________ ____ scan to identify weaknesses in a network and determine if the system can be exploited.
a. Banner Grab
b. Exploit Scan
c. Service Scan
d. Vulnerability Scan
d. Vulnerability Scan
Web Server Attack Tools:
________ is an exploit which supports fully automated exploitation of web servers, by abusing known vulnerabilities and leveraging weak passwords via Telnet, SSH, HTTP, and SNMP.
a. Metasploit
b. Nessus
c. IntelLink
d. Lexus Nexus
a. Metasploit
Patch Management:
A ________ adds functionality to a system.
a. Service Pack
b. Patch
c. Exploit
d. Hotfix
b. Patch
Patch Management:
A _________ is a combination of 100+ hotfixes and patches for a system.
a. Service Pack
b. Patch
c. Exploit
d. Hotfix
a. Service Pack
Patch Management:
A ________ fixes things or something on a system.
a. Service Pack
b. Patch
c. Exploit
d. Hotfix
d. Hotfix