-
Which of the following is an attack that injects malicious scripts into web pages to redirect users to fake websites or gather personal information?
-
What is the technique where an attacker inserts SQL database commands into a data-input field of an order form used by a web-based application?
-
What tools allows you to detect vulnerabilities in web applications related with JavaScript?
-
What tool allows you to obtain data structures from websites?
-
What tool allows you to detect sql-injection-type vulnerabilities in web applications?
-
Which profile in the w3af tool performs a scan to identify the vulnerabilities with higher risk, such as SQL Injection and Cross-site scripting (XSS)?
-
Which is the main class in w3af API that contains all the methods and properties needed to enable plugins, establish the objective of an attack, and manage profiles?
-
What is the...
United States
United Kingdom
India
Germany
France
Canada
Russia
Spain
Brazil
Australia
Argentina
Austria
Belgium
Bulgaria
Chile
Colombia
Cyprus
Czechia
Denmark
Ecuador
Egypt
Estonia
Finland
Greece
Hungary
Indonesia
Ireland
Italy
Japan
Latvia
Lithuania
Luxembourg
Malaysia
Malta
Mexico
Netherlands
New Zealand
Norway
Philippines
Poland
Portugal
Romania
Singapore
Slovakia
Slovenia
South Africa
South Korea
Sweden
Switzerland
Taiwan
Thailand
Turkey
Ukraine