adplus-dvertising
frame-decoration

Question

____________ is a tiny script that if uploaded to a web server can give hacker complete control of a remote PC.

a.

Spyware

b.

ASP Trojan

c.

Web ransomware

d.

Stuxnet

Posted under Cyber Security

Answer: (b).ASP Trojan

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. ____________ is a tiny script that if uploaded to a web server can give hacker complete control of a remote PC.

Similar Questions

Discover Related MCQs

Q. ____________ logs all the visits in log files which is located at <%systemroot%>\logfiles.

Q. Which of the following is not a web server attack type?

Q. ______________ tool clears the log entries in the IIS log files filtered by an IP address.

Q. CleanIISLog is not a hacking tool.

Q. Which of the following is not an appropriate countermeasure for web server hacking?

Q. Which of the following is not an appropriate countermeasure for web server hacking ?

Q. A _______________ is a program application which is stored on a remote-server & distributed over the Internet when a user uses a browser interface to request for such applications.

Q. Which of the following is not an example of web application hacking?

Q. _______________ hacking refers to mistreatment of applications through HTTP or HTTPS that can be done by manipulating the web application through its graphical web interface or by tampering the Uniform Resource Identifier (URI).

Q. Which of the following is not an appropriate method of web application hacking?

Q. XSS stands for _________________

Q. Which of the following is not a threat of web application?

Q. Which of the following is not a threat of web application ?

Q. ________ Injection attack is a special attack done through character elements “Carriage Return” or “Line Feed.” Exploitation can be done when an attacker is capable to inject a CRLF series in an HTTP stream.

Q. Which of the following scripting language is used for injecting executable malicious code for web-app hacking?

Q. ______________ takes advantage if hidden fields that work as the only security measure in some applications.

Q. _____________ is the attack method for decoding user credentials. Using this technique an attacker can log on as a user & gain access to unauthorized data.

Q. Which of the following is not an example of web application hacking technique?

Q. _____________ are unwanted software intended to pitch advertisements upon the user’s screen, most often within a web browser.

Q. PUP is abbreviated as ____________