Brandon Pina M12 Challenge Submission File
pdf
keyboard_arrow_up
School
Arizona State University *
*We aren’t endorsed by this school
Course
598
Subject
Information Systems
Date
Dec 6, 2023
Type
Pages
7
Uploaded by BrandonPina
Cybersecurity
Module 12 Challenge Submission File
Web Development
Make a copy of this document to work in, and then respond to each question below the
prompt. Save and submit this completed file as your Challenge deliverable.
HTTP Requests and Responses
1.
What type of architecture does the HTTP request and response process occur
in?
This client-server architecture allows for the separation of concerns, where the client
is responsible for the user interface and user interactions, and the server is
responsible for processing requests and managing resources. This separation
enables scalability, as multiple clients can interact with a single server, and vice versa.
2.
What are the parts of an HTTP request?
An HTTP (Hypertext Transfer Protocol) request consists of several parts, each serving
a specific purpose. Here are the key components of an HTTP request 1. Request Line
2. Headers 3. Body
3.
Which part of an HTTP request is optional?
The Request body is part of the HTTP request which is optional
4.
What are the three parts of an HTTP response?
The HTTP response consists of the status line, Headers, and the Optional
body
5.
Which number class of status codes represents errors?
HTTP status codes of the fourth class represent client errors, i.e. errors that result
from a faulty request by the client
6.
What are the two most common request methods a security professional
encounters?
While GET and POST are by far the most common methods that are used to access
information provided by a web server, there are a variety of other methods that may
also be supported and can sometimes be exploited by attackers
7.
Which type of HTTP request method is used to send data?
POST is used to send data to a server to create/update a resource. Some notes on
POST requests
8.
Which part of an HTTP request contains the data being sent to the server?
The request body
9.
In which part of an HTTP response does the browser receive the web code to
generate and style a webpage?
The response body
Using curl
10. What are the advantages of using
curl
over the browser?
Curl is a fast and efficient way to pull the information you need from the internet
without using a graphical interface
11. Which
curl
option changes the request method?
When doing HTTP with curl, the -X option changes the actual method string in the
HTTP request
12. Which
curl
option sets request headers?
We can use curl -h or curl -verbose to display the request headers and response
headers in the CURL command. The > lines are request headers. The < lines are
response headers
13. Which
curl
option is used to view the response header?
All HTTP replies contain a set of response headers that are normally hidden, use curl's
--include ( -i ) option to display them as well as the rest of document
14.Which request method might an attacker use to figure out what HTTP requests
an HTTP server will accept?
Options
Sessions and Cookies
15. Which response header sends a cookie to the client?
HTTP/1.1 200 OK
Content-type:
text/html
Set-Cookie:
cart=Bob
Set-Cookie
16. Which request header will continue the client's session?
GET
/cart HTTP/1.1
Host:
www.example.org
Cookie:
cart=Bob
Cookie
Example HTTP Requests and Responses
Use the following sample HTTP request and response to answer the questions in this
section:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
HTTP Request
POST
/login.php HTTP/1.1
Host:
example.com
Accept-Encoding:
gzip, deflate, br
Connection:
keep-alive
Content-Type:
application/x-www-form-urlencoded
Content-Length:
34
Upgrade-Insecure-Requests:
1
User-Agent:
Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.132 Mobile
Safari/537.36
username=Barbara&password=password
17. What is the request method?
POST
18. Which header expresses the client's preference for an encrypted response?
Upgrade-Insecure-Requests
19. Does the request have a user session associated with it?
No
20. What kind of data is being sent from this request body?
application/x-www-form-urlencoded
HTTP Response
HTTP/1.1 200 OK
Date:
Mon, 16 Mar 2020 17:05:43 GMT
Last-Modified:
Sat, 01 Feb 2020 00:00:00 GMT
Content-Encoding:
gzip
Expires:
Fri, 01 May 2020 00:00:00 GMT
Server:
Apache
Set-Cookie:
SessionID=5
Content-Type:
text/html; charset=UTF-8
Strict-Transport-Security:
max-age=31536000; includeSubDomains
X-Content-Type:
NoSniff
X-Frame-Options:
DENY
X-XSS-Protection:
1; mode=block
[
page content
]
21. What is the response status code?
200
22. What web server is handling this HTTP response?
Apache
23. Does this response have a user session associated with it?
Yes
24. What kind of content is likely to be in the [page content] response body?
username=Barbara&password=password
25. If your class covered security headers, what security request headers have been
included?
Strict-Transport-Security
Monoliths and Microservices
26. What are the individual components of microservices called?
Services
27. What is a service that writes to a database and communicates to other services?
API’s
28. What type of underlying technology allows for microservices to become scalable and
have redundancy?
Containerization platforms
Deploy and Test a Container Set
29. What tool can you use to deploy multiple containers at once?
Docker Compose
30. What kind of file format is required to deploy a container set?
YAML file
Databases
31.Which type of SQL query would you use to view all the information in a table
called
customers
?
SELECT * FROM Customers
32.Which type of SQL query would you use to enter new data into a table? (You
don't need a full query, just the first part of the statement.)
The INSERT INTO statement of SQL is used to insert a new row/record in table
33. Why would you never run
DELETE FROM <table-name>;
by itself?
It will delete the entire table
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Optional Additional Challenge Activity: The Cookie Jar
Question 1:
Did you see any obvious confirmation of a login? (Y/N)
[Enter answer here]
Question 2:
How many items exist in this file?
[Enter answer here]
Question 3:
Is it obvious that you can access the dashboard? (Y/N)
[Enter answer here]
Question 4:
Look through the output where
Dashboard
is highlighted. Does any of the
wording on this page seem familiar? (Y/N) If so, you should be successfully logged in to
your Editor's dashboard.
[Enter answer here]
Question 5:
What happens this time?
[Enter answer here]
© 2023 edX Boot Camps LLC. Confidential and Proprietary. All Rights Reserved.