How are Common Gateway Interface (CGI) script intrusions implemented and prevented?
What will be an ideal response?
If the Web server isn't configured correctly, a remote user can run CGI scripts as a root user. The file system is a major vulnerability, so a remote user might be able to install and run a CGI script from a poorly secured /tmp directory and gain unauthorized access to the server. Configuring the Web server to run CGI scripts only from specified locations prevents CGI script intrusions.
You might also like to view...
Name two ways (show statements) in which a value can be accessed in a program.
What will be an ideal response?
The statement, 'or '1'='1, always returns ____.
A. true B. false C. yes D. no
Which of the following is the dotted-decimal notation (DDN) equivalent of /18?
A) 255.255.128.0 B) 255.255.192.0 C) 255.255.224.0 D) 255.255.240.0
________ memory cards are a form of a solid-state storage device widely used in smartphones, digital media players, and GPS navigation systems.
A. Digital versatile disc B. SSD C. RAID D. Flash