Question: QUESTION An attacker has been successfully modifying the purchase price of items purchased at a web site. The security administrators verify the web server and

 QUESTION An attacker has been successfully modifying the purchase price of

QUESTION An attacker has been successfully modifying the purchase price of items purchased at a web site. The security administrators verify the web server and Oracle database have not been compromised directly. They have also verified the IDS logs and found no attacks that could have caused this. What is the mostly likely way the attacker has been able to modify the price? OA. By using SQL injection OB. By using cross site scripting O c. By changing hidden form values in a local copy of the web page O D There is no way the attacker could do this without directly compromising either the web server or the database QUESTION 2 Bob has a good understanding of cryptography, having worked with it for many years. Cryptography is used to secure data from specific threats, but it does not secure the application from coding errors. It can provide data privacy;integrity and enable strong authentication but it cannot mitigate programming errors. What is a good example of a programming error that Bob can use to explain to the management how encryption will not address all their security concems? O A.Bob can explain that using a weak key management technique is a form of programming error O B. Bob can explain that using passwords to derive cryptographic keys is a form of a programming error Oc.Bob can explain that a buffer overflow is an example of programming error and it is a common mistake associated with poor programming technique O D. Bob can explain that a random number generator can be used to derive cryptographic keys but it uses a weak seed value and this is a form of a programming error

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!