Filters
Question type

Study Flashcards

What are some security issues related to web-based applications?

Correct Answer

verifed

verified

As more applications are moving to a bro...

View Answer

_______________ are small chunks of ASCII text passed within an HTTP stream to store data temporarily in a web browser instance.

Correct Answer

verifed

verified

Using SSL protects your data from interception by devices such as key loggers.

A) True
B) False

Correct Answer

verifed

verified

Which are the most common exploit used to hack into a system?


A) Buffer overflows
B) Birthday attacks
C) Weak key attacks
D) Man-in-the-middle attacks

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Authenticode is used to encrypt program code so that it is more difficult for hackers to reverse engineer it.

A) True
B) False

Correct Answer

verifed

verified

With the RSA and Diffie-Hellman handshakes


A) The server and the client agree on what type of browser to use.
B) Parameters are agreed upon and certificates and keys are exchanged.
C) Parameters are agreed upon so that java scripts cannot execute inside the client system.
D) Office applications are able to e-mail secure documents.

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

B

To enable interoperability the __________ standard was created as a standard for directory services.

Correct Answer

verifed

verified

The presence of the keyword "secure" in a cookie indicates that it can only be accessed by the web site that placed it there in the first place.

A) True
B) False

Correct Answer

verifed

verified

As a network administrator,what are some of the options you have for providing secure file transfer?

Correct Answer

verifed

verified

FTP operations occur in plaintext,allowi...

View Answer

HTTP uses TCP port 8080.

A) True
B) False

Correct Answer

verifed

verified

False

_______________ is using an embedded control from another site with or without the other site's permission.

Correct Answer

verifed

verified

What are some of the security issues associated with web applications and plug-ins?

Correct Answer

verifed

verified

Web browsers have mechanisms to enable p...

View Answer

_______________ was the original method for having a web server execute a program outside the web server process but on the same server.

Correct Answer

verifed

verified

Common Gat...

View Answer

The Terms RC4 and 3DES refer to


A) Protocols used by servers to create dynamic websites
B) Encryption algorithms used to encrypt data
C) Protocols used to create directories for web services
D) Classes of XML protocols used for web services

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

B

Which of the following URL segments signifies that it is secure for transmission over the Internet?


A) wwws
B) https
C) shtml
D) aspx

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

The SFTP protocol incorporates what into FTP?


A) SSL
B) Secure java scripting
C) 28 bit encryption key
D) the TCP protocol

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Common Gateway Interface (CGI) security issues include


A) Poorly configured CGIs can crash when users input unexpected data.
B) CGI can only be programmed in one insecure language.
C) CGI can only perform one process at a time making it very susceptible to denial of service attacks.
D) CGI will only work with Internet Explorer.

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Running Java applets from the Web on your system is considered


A) A security risk
B) Not risky
C) Somewhat secure
D) Very secure

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

CVE provides security personnel with a common language to use when discussing vulnerabilities.

A) True
B) False

Correct Answer

verifed

verified

What are some of the security concerns regarding scripting?

Correct Answer

verifed

verified

Scripts are pieces of code that can exec...

View Answer

Showing 1 - 20 of 45

Related Exams

Show Answer