-
Which of the following is an attack that injects malicious scripts into web pages to redirect users to fake websites or gather personal information?
-
What is the technique where an attacker inserts SQL database commands into a data-input field of an order form used by a web-based application?
-
What tools allows you to detect vulnerabilities in web applications related with JavaScript?
-
What tool allows you to obtain data structures from websites?
-
What tool allows you to detect sql-injection-type vulnerabilities in web applications?
-
Which profile in the w3af tool performs a scan to identify the vulnerabilities with higher risk, such as SQL Injection and Cross-site scripting (XSS)?
-
Which is the main class in w3af API that contains all the methods and properties needed to enable plugins, establish the objective of an attack, and manage profiles?
-
What is the...
Germany
Slovakia
Canada
Brazil
Singapore
Hungary
Philippines
Mexico
Thailand
Ukraine
Luxembourg
Estonia
Lithuania
Norway
Chile
United States
Great Britain
India
Spain
South Korea
Ecuador
Colombia
Taiwan
Switzerland
Indonesia
Cyprus
Denmark
Finland
Poland
Malta
Czechia
New Zealand
Austria
Turkey
France
Sweden
Italy
Egypt
Belgium
Portugal
Slovenia
Ireland
Romania
Greece
Argentina
Malaysia
South Africa
Netherlands
Bulgaria
Latvia
Australia
Japan
Russia