Question 1. Why is it critical to perform a penetration test on a Web application and a Web server prior to production implementation?
Question 2. What is a cross-site scripting attack? Explain in your own words.
Question 3. What is a reflective cross-site scripting attack?
Question 4. What common method of obfuscation is used in most real-world SQL attacks?
Question 5. Which Web application attack is more prone to extracting privacy data elements out of a database?