1. According to the URL explained in above question, what is the attacker-s possible intention with the second URL, as per the preceding scenario?
A) Creation of a new user on the underlying host having the username Steve and read-only access to the /tmp directory
B) Creation of a new user on the system-s database having administrative privileges under the username Steve
C) Creation of a new web app account having the username Attacker and administrative privileges
D) Creation of a new web app account having the username Steve and read-only permission
2. According to the preceding scenario, what are the vulnerabilities or attacks that have been chained together leading to the creation of the attacker-s account? (Choose two)(Select 2answers)
A) Code Injection
B) CSRF
C) Directory Traversal
D) Insecure Direct Object Reference
3. When computing system is forced to perform two or more operations simultaneously, it is called _____________.
A) A Back-end Service
B) Race Condition
C) File Inclusion
D) Session Fixation
4. From the following, which intrusion takes the advantage of programming errors or design flaws granting the attacker elevated access to the network?
A) Code Injection
B) Privilege Escalation
C) Unsecure SUDO
D) Cross-site Request Forgery
5. Which one of the following is not an anonymizer for mobile?
A) Orbot
B) Psiphon
C) Net Shed
D) Open Door