Professional Documents
Culture Documents
com
000-139
IBM
AppScan Standard Edition
http://www.twpass.com/twpass.com/exam.aspx?eCode= 000-139
The 000-139 practice exam is written and formatted by Certified Senior IT Professionals working in
today's prospering companies and data centers all over the world! The 000-139 Practice Test covers all
the exam topics and objectives and will prepare you for success quickly and efficiently.
The 000-139 exam is very challenging, but with our 000-139 questions and answers practice exam,
you can feel confident in obtaining your success on the 000-139 exam on your FIRST TRY!
IBM 000-139 Exam Features
- Detailed questions and answers for 000-139 exam
- Try a demo before buying any IBM exam
- 000-139 questions and answers, updated regularly
- Verified 000-139 answers by Experts and bear almost 100% accuracy
- 000-139 tested and verified before publishing
- 000-139 exam questions with exhibits
- 000-139 same questions as real exam with multiple choice options
Acquiring IBM certifications are becoming a huge task in the field of I.T. More over these
exams like 000-139 exam are now continuously updating and accepting this challenge is itself a task.
This 000-139 test is an important part of IBM certifications. We have the resources to
prepare you for this. The 000-139 exam is essential and core part of IBM certifications and
once you clear the exam you will be able to solve the real life problems yourself.Want to take
advantage of the Real 000-139 Test and save time and money while developing your skills to pass
your IBM 000-139 Exam? Let us help you climb that ladder of success and pass your 000-139 now!
000-139
QUESTION: 1
Which type of vulnerability can occur when a developer exposes a reference to an internal
implementation object, such as a file, directory, database record, or key, as a URL or form
parameter?
A. Cross-site Scripting
B. Insecure Direct Object Reference
C. Injection Flaw
D. Cross Site Request Forgery
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-139&qno=1
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 2
After 30 minutes your scan stops with an out-of-session error. What is a possible cause of this
error?
QUESTION: 3
AppScan sent the following test HTTP request: GET
/web/content/index.php?file=/../../../../../../../../etc/passwd%00 HTTP/1.0 Cookie:
JSESSIONID=dqt0LSnfhdVyTJkCwTwfLQQSkTTGYX9D79tLLpT1yLQjVhSpZKP9!91437
6523; customerLanguage=en Accept: */* Accept-Language: en-US User-Agent: Mozilla/4.0
(compatible; MSIE 6.0; Win32) Host: www.ibm.com Although, there is no indication in the
response about the existence of a password file, AppScan reported vulnerability with the
following reasoning: Global Validation found an embedded script in the response
(<script>alert(25053)</script>), which was probably injected by a previous test. The presence
of this script in the site suggests that the application is vulnerable to which type of attack?
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 4
What information does difference displayed in the Request / Response tab provide?
QUESTION: 5
You are scanning a Web site in a pre-production environment. You notice that your scan is
running very slowly and there are numerous communication errors. What would you do to
resolve the problem?
QUESTION: 6
Which type of vulnerability allows an attacker to execute a malicious script in a user browser?
A. Cross-site Scripting
B. Injection Flaw
C. Insecure Direct Object Reference
D. Failure to restrict URL access
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-139&qno=6
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 7
Which statement is true about infrastructure vulnerabilities?
A. They are caused by insecure coding and are fixed by modifying the application code.
B. They are detected using application security scanners and exist in the Web
application.
C. They are known vulnerabilities and are fixed by modifying the application code.
D. They exist in third-party components and are fixed by applying security patches.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-139&qno=7
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 8
What does secure session management require?
QUESTION: 9
Your site contains the following URL:
http://www.mycompany.com/smb/default.jsp?page=wireless productID=65343, In this URL,
the page parameter defines a unique page and the productID parameter defines a different
product page, based on a template. How would you configure AppScan to thoroughly explore
this site while avoiding redundant URLs? (Choose two.)
QUESTION: 10
You are scanning a Web application in a pre-production environment. During your initial
assessment, you notice that some of the links are specified by IP and some by host name. Your
starting URL contains an IP address, http://12.34.56.67/default.jsp. When the scan completes,
you discover that it has not covered a significant portion of your Web application. What could
be the reason?
A. The host name is not added to the list of additional domains and servers.
B. The scan is configured to use only one connection.
C. There is no route to IP 12.34.56.67.
D. You are not licensed to scan IP 12.34.56.67.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-139&qno=10
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 11
You expect your scan to cover around 500 pages, but instead it covers 55. What are three
possible reasons for this? (Choose three.)
QUESTION: 12
Which lines in an HTTP response would trigger a positive result from an AppScan test for a
vulnerability of type Possible Server Path Disclosure Pattern Found?
QUESTION: 13
Which Web application operation indicates that the application may be vulnerable to Cross-site
Request Forgery?
QUESTION: 14
How does in-session detection work?
A. checks if the in-session pattern is present in every test response you receive from the
site
B. pings the application every 5 seconds and verifies the connection
C. sends the in-session detection request every 5 seconds and verifies that the in-session
pattern exists
D. updates the session token values to ensure that the user is still logged in
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-139&qno=14
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 15
Which three steps should you take before running a security scan with AppScan? (Choose
three.)
QUESTION: 16
Which statement is true about network firewalls preventing Web application attacks?
A. Network firewalls cannot prevent attacks because ports 80 and 443 must be open.
B. If configured properly, network firewalls can prevent attacks.
C. Network firewalls cannot prevent attacks because it is too complex to configure.
D. Network firewalls can prevent attacks because they can detect malicious HTTP
traffic.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-139&qno=16
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 17
Which username/passwords combination would NOT be reported as predictable by AppScan?
A. admin/admin
B. johnr/Na2acrA
C. user1/password
D. johnr/nascar
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-139&qno=17
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 18
When would you set up a multi-step operation in AppScan?
QUESTION: 19
What does a Cross-site Scripting vulnerability allow an attacker to do?
QUESTION: 20
AppScan belongs to which category of vulnerability assessment tools?
A. Host Scanners
B. Network Scanners
C. Black-Box Scanners
D. White-Box Scanners
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-139&qno=20
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 21
What are two reasons why it is recommended that a Web application be scanned in a preproduction environment? (Choose two.)
QUESTION: 22
What is indicative of Information Leakage vulnerability?
QUESTION: 23
In the AppScan Application Data view, what can help you determine if your application was
fully explored? (Choose two.)
A. Visited URLs
B. JavaScripts
C. Cookies
D. Broken links
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-139&qno=23
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 24
AppScan received the following test response: An Error Has Occurred Summary: Syntax
error in string in query expression userid = . Error Message:
System.Data.OleDb.OleDbException: Syntax error in string in query expression userid = . at
System.Data.OleDb.OleDbCommand.ExecuteCommandTextForSingleResult(tagDBPARAMS
dbParams, Object executeResult) at ? Which type of vulnerability does this error message
indicate?
A. SQL Injection
B. Blind SQL Injection
C. XSS
D. Possible Server Path Disclosure Found
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-139&qno=24
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 25
When can an injection type attack occur?
QUESTION: 26
Which statement is true about application-specific vulnerabilities?
A. They exist in third-party components and are fixed by applying security patches.
B. They are caused by insecure coding and are fixed by modifying the application code.
C. They are detected using application security scanners and exist in third-party
components.
D. They are known vulnerabilities and are fixed by modifying the application code.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-139&qno=26
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 27
What are the implications of Malicious File Execution vulnerabilities?
QUESTION: 28
Where can you find details about a test AppScan executed during a scan?
QUESTION: 29
If the URL to your home page is http://domain.com and it redirects to http://www.domain.com,
how would you configure your scan?
A. do not do anything
B. configure the AppScan proxy settings
C. add www.domain.com to the list of additional domains
D. edit your DNS settings
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-139&qno=29
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 30
Which type of vulnerability allows an attacker to browse files that shouldn be accessible (e.g.
*.bak, "Copy of", *.inc, etc.) or pages restricted forWhich type of vulnerability allows an
attacker to browse files that shouldn? be accessible (e.g. *.bak, "Copy of", *.inc, etc.) or pages
restricted for users with higher privileges?
QUESTION: 31
Which HTTP response codes trigger Application Error vulnerabilities?
A. 500
B. 302
C. 403
D. 200
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-139&qno=31
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 32
AppScan reported a large number of idden files, which you know do not exist on your Web
server. What is the likely cause?
QUESTION: 33
How does an attacker exploit Web application vulnerabilities?
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-139&qno=33
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 34
Which AppScan report type relates to Sarbanes-Oxley Act, HIPPA and FISMA?
A. Compliance
B. WASC Threat Classification
C. OWASP Top 10
D. Delta Analysis
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-139&qno=34
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 35
An AppScan test successfully embedded the following lines in an HTTP response header (in
bold): HTTP/1.1 200 OK Content-Length: 5710 Connection: close Date: Wed, 07 May 2008
19:36:28 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version:
2.0.50727 Set-Cookie: lang=Foobar AppScanHeader: AppScanValue/1.2-3
SecondAppScanHeader: whatever; path=/ Cache-Control: private Content-Type: text/html;
charset=utf-8 Which type of vulnerability does this indicate?
A. Cross-site Scripting
B. XPath Injection
C. HTTP Response Splitting
D. SQL Injection
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-139&qno=35
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 36
How can an attacker use the information gained by an SQL debug message?
QUESTION: 37
Which type of parameters does AppScan manipulate when testing a .Net Web Service
A. JSON parameters
QUESTION: 38
AppScan identified a Blind SQL Injection vulnerability in your Web application by sending
three requests, all of which modify the searchText parameter in the following way: HTTP
request 1: 1234 and foobar = foobar HTTP request 2: 1234 and boofar = foobar HTTP
request 3: 1234 or barfoo = foobar Upon reviewing the three responses, you notice that
response 1 and response 3 are identical and response 2 only differs in the fact that the date and
time on the page changed (i.e. 23:59 Dec 31, 2008 to 00:01 Jan 1, 2009). What do you
conclude from this information?
QUESTION: 39
After scanning your site with AppScan, you notice that your password was changed to 234.
What most likely happened?
A. One of the AppScan tests hacked your account and changed the password.
B. AppScan followed the Reset Password link.
C. AppScan submitted the change password form.
D. Your system admin changed your password during the scan.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-139&qno=39
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 40
What is the problem with the following session pattern? Good morning, John!
QUESTION: 41
Your site contains the following URL:
http://www.mycompany.com/smb/default.jsp?page=wireless In this URL, the Page parameter
defines a unique page. How would you configure AppScan to fully explore this site?
QUESTION: 42
How do you test a Web service with AppScan?
A. interact with the Web service methods manually and then run AppScan to send the
generated tests automatically
B. explore the Web service automatically and then manually sends the generated tests
one by one
C. create a Python script for testing the service
D. explore the Web service automatically and then run AppScan to send the generated
tests automatically
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-139&qno=42
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 43
In which three areas does AppScan test for vulnerabilities?
QUESTION: 44
To construct a test, AppScan changed an HTTP request by removing the File CFile and
First_name parameters and changing the value of the Email_address mail_address parameter
to "><script>alert(23443)</script>"> Which type of vulnerability is AppScan testing for?
A. SQL Injection
B. XPath Injection
C. Cross-site Scripting
D. Possible Server Path Disclosure Found
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-139&qno=44
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 45
Which three actions should you take if your application requires form-based authentication?
(Choose three.)
QUESTION: 46
What information does reasoning displayed in the Request / Response tab provide?
QUESTION: 47
How does AppScan test a Web application?
QUESTION: 48
What happens when AppScan generates an Industry Standard report?
QUESTION: 49
Which defense is most reliable in protecting a Web application from being hacked?
QUESTION: 50
You notice that when you run your scan, your login account gets locked out. How can you
resolve the issue?
QUESTION: 51
Directories containing sensitive files must be hidden from the user. What is the best way to
hide the existence and content of such a directory?
QUESTION: 52
Why is it important to encrypt the HTTP traffic for an authenticated connection between a
client and Web server?