Filters
Question type

Study Flashcards

What are some of the security issues associated with web applications and plug-ins?

Correct Answer

verifed

verified

Web browsers have mechanisms to enable p...

View Answer

What are some security issues related to web-based applications?

Correct Answer

verifed

verified

As more applications are moving to a bro...

View Answer

Running Java applets from the Web on your system is considered


A) A security risk
B) Not risky
C) Somewhat secure
D) Very secure

Correct Answer

verifed

verified

Common Gateway Interface (CGI) security issues include


A) Poorly configured CGIs can crash when users input unexpected data.
B) CGI can only be programmed in one insecure language.
C) CGI can only perform one process at a time making it very susceptible to denial of service attacks.
D) CGI will only work with Internet Explorer.

Correct Answer

verifed

verified

The Terms RC4 and 3DES refer to


A) Protocols used by servers to create dynamic websites
B) Encryption algorithms used to encrypt data
C) Protocols used to create directories for web services
D) Classes of XML protocols used for web services

Correct Answer

verifed

verified

B

With the RSA and Diffie-Hellman handshakes


A) The server and the client agree on what type of browser to use.
B) Parameters are agreed upon and certificates and keys are exchanged.
C) Parameters are agreed upon so that java scripts cannot execute inside the client system.
D) Office applications are able to e-mail secure documents.

Correct Answer

verifed

verified

B

_______________ are small chunks of ASCII text passed within an HTTP stream to store data temporarily in a web browser instance.

Correct Answer

verifed

verified

Which are the most common exploit used to hack into a system?


A) Buffer overflows
B) Birthday attacks
C) Weak key attacks
D) Man-in-the-middle attacks

Correct Answer

verifed

verified

Which of the following URL segments signifies that it is secure for transmission over the Internet?


A) wwws
B) https
C) shtml
D) aspx

Correct Answer

verifed

verified

What are some of the security concerns regarding scripting?

Correct Answer

verifed

verified

Scripts are pieces of code that can exec...

View Answer

_______________ was the original method for having a web server execute a program outside the web server process but on the same server.

Correct Answer

verifed

verified

Common Gat...

View Answer

_______________ is using an embedded control from another site with or without the other site's permission.

Correct Answer

verifed

verified

The SFTP protocol incorporates what into FTP?


A) SSL
B) Secure java scripting
C) 28 bit encryption key
D) the TCP protocol

Correct Answer

verifed

verified

Authenticode is used to encrypt program code so that it is more difficult for hackers to reverse engineer it.

Correct Answer

verifed

verified

As a network administrator,what are some of the options you have for providing secure file transfer?

Correct Answer

verifed

verified

FTP operations occur in plaintext,allowi...

View Answer

Using SSL protects your data from interception by devices such as key loggers.

Correct Answer

verifed

verified

To enable interoperability the __________ standard was created as a standard for directory services.

Correct Answer

verifed

verified

HTTP uses TCP port 8080.

Correct Answer

verifed

verified

False

CVE provides security personnel with a common language to use when discussing vulnerabilities.

Correct Answer

verifed

verified

The presence of the keyword "secure" in a cookie indicates that it can only be accessed by the web site that placed it there in the first place.

Correct Answer

verifed

verified

Showing 1 - 20 of 45

Related Exams

Show Answer