What are the ways in which attackers can infiltrate the system?
Correct Answer
- Web servers can be infiltrated using the command shell by an attacker to read the HTML files that is getting transferred - If the set-uid scripts are not proper and bad then the infiltration can happen by the attacker - The processes are not given proper permissions so that the password can be changed by using the ?passwd? command to change the password of the system - This also authenticates the user for accessing the system and the files on it containing the data - The program that is used in the operating system doesn?t follow the principle of least privilege and lead to security issues
Technology problems
Search Results
1. What are the security features being provided in web security?
Correct Answer: Security features are very essential in the system as it provides an overall security of the system by applying the patches and the services that keeps the unwanted access away The security features included are as follows: - Use of algorithms in relation to, the security and the system to, solve the problem of the security - Use of SSL or any encryption method to, protect the system from intrusion or any other attack - Use of SSL in the SimpleWebServer that doesn?t provides the protection against the DoS attack and doesn?t allow the accessing to, be done using the /etc/shadow
2. Write a program to fix the error being produced by the Infinite file?
Correct Answer: - The infinite file error can be solved when the data will be read continuously from the file - The error can be solved by using the keys that provide only the resources that are required - The following program is as follows: oswwrite ("HTTP/10 200 OK\n\n"); while (c != -1) { sbappend((char)c); c = frread(); } oswwrite (sbtoString()); - This converts the requested file in such a way that if the file exists it shows the messages as ok otherwise it shows an error - Limited file access is to be given to the file to remove the error from the infinite file type
3. What is the use of Infinite file in Web security?
Correct Answer: - Infinite file consists of random bits of code that is stored in /dev/random file used to generate the cryptographic keys - Infinite file consists of the source of infinite data that can be used to provide the response in easy manner - Web server consists of the file that is received by the server in this format GET //dev/random HTTP/10 - Web server provides the continuous data that can be read from /dev/random/ before the web server can run out of the memory - The server crashes out in case it runs out of the memory due to the infinite file type and it is very essential in case of the web security
Correct Answer: - Fail-safe approach defines the level that divides the security such that it is safe even in case the system is failed - The fail safe approach doesn?t allow an attacker to take the advantage by breaking in the system and crashes out - This approach allows the web server to perform the routines even if the system runs out of the memory in case of any attack - The system in attacks doesn?t skip the access to the control check or it doesn?t skip serving any document requested - Fail safe approach can force the web server to run of the memory and have a DoS attack
5. What are the principles in providing the security for the computer programs?
Correct Answer: - The principle of least privilege is used to provide more security to the computer programs - The principle allows the designing of the program such that any unauthorized access is not allowed and only the person who owns the program will be able to access it - The services provided should be able to access only those products that need the services - Web servers that are involved in responding the queries of the web users provide only accessing to the HTML files that will serve the purpose of the programs - Computer programs should be made such that it provides secure features of logging into the program with proper authentication
Correct Answer: => When a consumer wants to buy a certain product, he go to the website and selects the product he wants to buy => Once the product is selected, the consumer transaction is moved to the online transaction server where he places an order => The informations is exchanged over a secure channel through a private gateway to a processing network => The networked banks accept or reject the transaction All this happens in just a matter of seconds E-commerce is a very secure due to the SSL (Secure Socket Layer) technology
Correct Answer: The major benefits of Ecommerce are: - Secure : More secure than a cheque - Fast : The transactions take not more than a few seconds - Always on : The purchases can be made 24/7 - Convenient: Ease of purchasing -Reduced cost price : Reduction of Marketing and Advertising Costs
Correct Answer: - The easiest difference is static HTML once rendered cannot be changed on the other hand dynamic HTML can be changed - Static web pages cannot have database access but dynamic pages can be connected to database - Using static HTML no interactions persist between user and server but dynamic HTML has capability to interact with the user - Static HTML does not require server side coding but dynamic HTML requires server side coding - No animation, games can be developed using the static HTML but on the other hand dynamic HTML can perform this task
9. Explain three important components of Dynamic HTML authoring - Positioning, Style modifications and Event handling
Correct Answer: - Positioning: Is some what where we need the object to be placed in the graphical view i:e on screen If we talk in DHTML sense then we have two types of positioning: Relative and Absolute Relative Positioning: Relative positioning is the same as the current HTML3 layout and is best reserved for situations where you want to be sure that the content will revert to this default inside a document that also uses absolute positioning Absolute Positioning: In DHTML absolute positioning means that the object will remain at the same position regardless of the condition of other elements and the size of the browser In simple languages if an object/image is absolutely positioned (STYLE="position: absolute;"), with an offset of 150 pixels to the right and 250 pixels down from the left-hand corner of the browser screen then it will avail this position what ever the circumstances may be - Style Modifications: Style modification indicates the changes in the presentation or the view part that are being made in web page This part comes under Cascading Style Sheet where the user style his web page by using the attributes and the tags that are pre-defined in CSS - Event Handling: As explained earlier Events is the beating heart of any JavaScript application For handling event in DHTML we attach event handler to HTML elements The event handler waits until a certain event, for instance a click on a link, takes place When it happens it handles the event by executing some JavaScript code that has been defined by us After it has executed the code the event handler comes to its initial state and waits for the user to fire any event Hence to handle events in DHTML we need to register an event handler
Correct Answer: DispatchAction is an action that comes with Struts 11 or later, that let us combine Struts actions into single class, each with their own method The orgapachestrutsactionDispatchAction class allows multiple operations to map to the different functions in the same Action class For e:g; html:hidden property="dispatch" value="error"/>