|
Related Questions |
View Answer |
|
What application generated the log file entry below? What type of attack is this? Assuming the index.php program is vulnerable, was this attack successful?
|
View Answer
|
|
What are some examples of you how you would attempt to gain access?
|
View Answer
|
|
If you were not using Apache as the reverse proxy, what Microsoft application/tool could you use to mitigate this attack?
|
View Answer
|
|
What are the most important steps you would recommend for securing a new web server? Web application?
|
View Answer
|
|
What is your definition of the term "Cross-Site Scripting"? What is the potential impact to servers and clients?
|
View Answer
|
|
What do you see as challenges to successfully deploying/monitoring web intrusion detection?
|
View Answer
|
|
What online resources do you use to keep abreast of web security issues? Can you give an example of a recent web security vulnerability or threat?
|
View Answer
|
|
What do you see as the most critical and current threats effecting Internet accessible websites?
|
View Answer
|