Which of the following would allow a test of what would occur if a hacker were able to circumvent a limit imposed by the browser?

A. fuzzers
B. HTTP interceptors
C. white boxes
D. password crackers


B
Explanation: HTTP interceptors intercept web traffic between a browser and a website. They permit actions that the browser would not. For example, it may allow the input of 300 characters, while the browser may enforce a limit of 50. This would allow a test of what would occur if a hacker were able to circumvent the limit imposed by the browser. These applications perform like a web proxy in that they monitor the traffic in both directions.

Computer Science & Information Technology

You might also like to view...

What numbers will be displayed in the list box when the button is clicked?

``` Private Sub btnDisplay_Click(...) Handles btnDisplay.Click Dim num as Double = 10 Do While num > 1 lstBox.Items.Add(num) num = num - 3 Loop End Sub ``` (A) 10, 7, and 4 (B) 10, 7, 4, and 1 (C) 10, 7, 4, 1, and -2 (D) No output

Computer Science & Information Technology

A(n) ________ controls how text and objects come onto the screen

Fill in the blank(s) with correct word

Computer Science & Information Technology

Tapping the F3 key opens a cell for editing.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Computer scientists break the movement of information from raw electrical voltage changes to humanly readable information as a series of abstraction layers. Which of the following is one of these abstraction layers?

a. Voltage fluctutations b. Changes in magnetic energy on the surface of a hard disk c. Character sets d. Binary streams e. All of the above

Computer Science & Information Technology