What are some of the common vulnerabilities in web applications that he should be concerned about?

Bret is a web application administrator and has just read that there are a number of surprisingly
common web application vulnerabilities that can be exploited by unsophisticated attackers with
easily available tools on the Internet. He has also read that when an organization deploys a web
application, they invite the world to send HTTP requests. Attacks buried in these requests sail past
firewalls, filters, platform hardening, SSL, and IDS without notice because they are inside legal
HTTP requests. Bret is determined to weed out vulnerabilities.
What are some of the common vulnerabilities in web applications that he should be concerned
about?

Bret is a web application administrator and has just read that there are a number of surprisingly
common web application vulnerabilities that can be exploited by unsophisticated attackers with
easily available tools on the Internet. He has also read that when an organization deploys a web
application, they invite the world to send HTTP requests. Attacks buried in these requests sail past
firewalls, filters, platform hardening, SSL, and IDS without notice because they are inside legal
HTTP requests. Bret is determined to weed out vulnerabilities.
What are some of the common vulnerabilities in web applications that he should be concerned
about?

A.
Non-validated parameters,broken access control,broken account and session
management,cross-site scripting and buffer overflows are just a few common vulnerabilities

B.
Visible clear text passwords,anonymous user account set as default,missing latest security
patch,no firewall filters set and no SSL configured are just a few common vulnerabilities

C.
No SSL configured,anonymous user account set as default,missing latest security patch,no
firewall filters set and an inattentive system administrator are just a few common vulnerabilities

D.
No IDS configured,anonymous user account set as default,missing latest security patch,no
firewall filters set and visible clear text passwords are just a few common vulnerabilities



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Ghost Man

Ghost Man

A is the Ans.