-
Which of the following is an attack that injects malicious scripts into web pages to redirect users to fake websites or gather personal information?
-
What is the technique where an attacker inserts SQL database commands into a data-input field of an order form used by a web-based application?
-
What tools allows you to detect vulnerabilities in web applications related with JavaScript?
-
What tool allows you to obtain data structures from websites?
-
What tool allows you to detect sql-injection-type vulnerabilities in web applications?
-
Which profile in the w3af tool performs a scan to identify the vulnerabilities with higher risk, such as SQL Injection and Cross-site scripting (XSS)?
-
Which is the main class in w3af API that contains all the methods and properties needed to enable plugins, establish the objective of an attack, and manage profiles?
-
What is the...
United States
Great Britain
India
Germany
France
Canada
Russia
Spain
Brazil
Australia
Singapore
Hungary
Ukraine
Luxembourg
Estonia
Lithuania
South Korea
Turkey
Switzerland
Colombia
Taiwan
Chile
Norway
Ecuador
Indonesia
New Zealand
Cyprus
Denmark
Finland
Poland
Malta
Czechia
Austria
Sweden
Italy
Egypt
Belgium
Portugal
Slovenia
Ireland
Romania
Greece
Argentina
Netherlands
Bulgaria
Latvia
South Africa
Malaysia
Japan
Slovakia
Philippines
Mexico
Thailand