Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

The session and token ID can be changed by using Sequencer.

Answer»

The session and token ID can be changed by using Sequencer.
Choose the CORRECT option from below LIST
(1)False
(2)True

Answer:-(1)False

2.

Which of the following can execute all the possible combination of attacks in Burp Suite?

Answer»

Which of the following can EXECUTE all the possible combination of attacks in Burp Suite?
CHOOSE the CORRECT option from below list
(1)Sniper
(2)BATTERING Ram
(3)Cluster Bomb
(4)Pitchfork

Answer:-(3)Cluster Bomb

3.

Which of the following application is about extending Burp proxy?

Answer»

Which of the FOLLOWING application is about EXTENDING Burp proxy?
Choose the correct option from below list
(1)It is better to be used in case of web application hacking.
(2)It is used to modify the HTTP REQUEST easily
(3)For testing multiple extensions.
(4)All the options

Answer:-(2)It is used to modify the HTTP request easily

4.

What are the tasks related to Burp Proxy for intercepting and manipulating the request?

Answer»

What are the tasks related to Burp Proxy for intercepting and manipulating the REQUEST?
Choose the correct option from below LIST
(1)Intercpet and modify HTTP/HTTPS traffic passing in both directions.
(2)This tool manages the CONTENT and serialization of the request.
(3)It is used to modify the REQUESTS automatically (4)Burp proxy is used to test manually the requests and responses.
(5)All the options

Answer:-(5)All the options

5.

Which of the following option enables to identify flaws automatically?

Answer»

Which of the following OPTION ENABLES to identify flaws automatically?
Choose the correct option from below LIST
(1)Sequencer
(2)Target
(3)COMPARER
(4)Scanner

Answer:-(1)Sequencer

6.

What is the role of a Sequencer in request manipulation in Burp Suite?

Answer»

What is the role of a SEQUENCER in request manipulation in Burp Suite?
Choose the correct OPTION from below list
(1)Check the strength of random VALUES, and define the applications status in TERMS of sessions.
(2)MAINTAIN the application performance for virus security.
(3)Define the applications status in terms of sessions.
(4)Check the strength of random values.

Answer:-(3)Define the applications status in terms of sessions

7.

What happens when Intercept is off?

Answer»

What happens when INTERCEPT is off?
CHOOSE the correct OPTION from below list
(1)The REQUEST will hit the server
(2)The request will hit the proxy
(3)Hit the proxy

Answer:-(1)The request will hit the server

8.

Which of the following can execute all the possible combination of attacks?

Answer»

Which of the following can execute all the possible combination of attacks?
Choose the correct OPTION from below LIST
(1)Sniper
(2)Battering RAM
(3)Cluster BOMB
(4)Pitchfork

Answer:-(3)Cluster Bomb

9.

What is the task of the Comment control when intercepting a Burp Suite request?

Answer»

What is the task of the Comment control when intercepting a Burp Suite request?
Choose the correct option from below list
(1)Toggles all interceptions.
(2)Adds a comment to enable identification LATER. (3)Edits the message.
(4)Displays a MENU of available ACTIONS that can be performed on the currently displayed message.

Answer:-(2)Adds a comment to enable identification later.

10.

Which of the following option is applicable for Action control for the panel in intercepting request?

Answer»

Which of the following option is applicable for Action control for the panel in intercepting request?
Choose the correct option from below LIST
(1)It is used to ABANDON the MESSAGE so that is not forwarded.
(2)It is used to check the proxy history and on the intercepted responses.
(3)This shows a menu of available actions that can be performed on the currently displayed message. (4)It is used to review and edit the message to send the message on to the server or browser.

Answer:-(3)This shows a menu of available actions that can be performed on the currently displayed message.

11.

The http history tab captures all host urls

Answer»

The http history tab CAPTURES all host urls
Choose the CORRECT OPTION from below list
(1)True
(2)False

Answer:-(1)True

12.

Which of the following is used for manual footprinting?

Answer»

Which of the FOLLOWING is used for manual footprinting?
CHOOSE the correct OPTION from below LIST
(1)FalseProxy
(2)Spider
(3)Target
(4)All of these

Answer:-(3)Target

13.

Which of the following option is true about XSS with Burp-Repeater tool?

Answer»

Which of the following option is true about XSS with Burp-Repeater tool?
CHOOSE the correct option from below list
(1)This tool uses a java script syntax like code to check the vulnerability.
(2)This tool checks the cross site scripting vulnerability AND this tool uses a java script syntax like code to check the vulnerability.
(3)This tool checks the cross site scripting vulnerability.
(4)It is used for authentication of the web APPLICATIONS.
(5)All the OPTIONS

Answer:-(5)All the options

14.

Which of the following statement is true about a cluster bomb attack?

Answer»

Which of the following statement is true about a cluster BOMB attack?
Choose the correct option from below list
(1)Cluster bomb attacks iterate through all PAYLOAD sets simultaneously.
(2)The total number of REQUESTS generated by the attack is the product of the number of payloads. (3)It uses multiple payload sets, and the total number of requests generated by the attack is the product of payloads.
(4)It uses multiple payload sets.

ANSWER:-(3)It uses multiple payload sets, and the total number of requests generated by the attack is the product of payloads.

15.

Where can responses be viewed in Burp Suite?

Answer»

Where can responses be VIEWED in Burp Suite?
Choose the CORRECT option from below list
(1)None of the options
(2)Intercept Tab
(3)HTTP History
(4)Option Tab

Answer:-(4)Option Tab

16.

You can check the response in Intercept tab

Answer»

You can CHECK the response in INTERCEPT tab
Choose the correct option from below list
(1)TRUE
(2)FALSE

Answer:-(2)False