Questions
As we conclude, here is a list of questions for you to test your knowledge regarding this chapter's material. You will find the answers in the Assessments section of the Appendix:
- Which type of vulnerability is an attack that injects malicious scripts into web pages to redirect users to fake websites or to gather personal information?
- What is the technique where an attacker inserts SQL database commands into a data input field of an order form used by a web-based application?
- Which
slmap
option lists all the available databases? - What is the name of the Nmap script that permits scanning for the Heartbleed vulnerability in a server?
- Which process allows us to establish an SSL connection with a server, consisting of the exchange of symmetric and asymmetric keys to establish an encrypted connection between a client and server?