Exam 8: Security of Web Applications

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is the best way to make sure data is properly encrypted while in transit?

Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
Verified

C

____ is a key component of the Web, working in conjunction with HTTP to move content from servers to clients.

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

B

Match each item with a statement below. a.Telnet f.CGI b.SNMP g.Perl c.NNTP h.PHP d.CSS i.CSRF e.XML -Developed in 1987 by Larry Wall as an interpreted language (based on C syntax) that helps provide a more robust scripting capability for UNIX.

Free
(Short Answer)
4.8/5
(28)
Correct Answer:
Verified

G

What is the best way to secure Telnet?

(Multiple Choice)
4.7/5
(38)

____ refers to a new use of existing technologies.

(Multiple Choice)
4.7/5
(36)

____ is the basis for Web communication.

(Multiple Choice)
4.9/5
(42)

The ____________________ is a set of applications (the software) that runs on top of the Internet.

(Short Answer)
5.0/5
(40)

Describe an open relay.

(Essay)
4.7/5
(31)

A major problem with FTP is that data is transferred in ____.

(Multiple Choice)
4.8/5
(38)

Most of the weaknesses with SNMP occur with Version 1 of SNMP.

(True/False)
4.8/5
(31)

To provide monitoring, an SNMP ____ must be installed on a desired host or network device.

(Multiple Choice)
4.8/5
(39)

Match each item with a statement below. a.Telnet f.CGI b.SNMP g.Perl c.NNTP h.PHP d.CSS i.CSRF e.XML -An extension to HTML that allows developers to define their own tags for structure.

(Short Answer)
4.8/5
(33)

An SMTP ____ is a simple message providing status information about the monitored device.

(Multiple Choice)
4.7/5
(37)

List five best practices a Web system administrators should use to secure a Web server.

(Essay)
4.7/5
(36)

A sender with a valid internal IP address should be allowed to send e-mail to external e-mail addresses.

(True/False)
4.8/5
(37)

____ is a simple method of transferring files between computer systems.

(Multiple Choice)
4.8/5
(41)

____________________ is used to send Internet mail.

(Essay)
4.9/5
(30)

In passive mode, the FTP client must listen and wait for the server connection.

(True/False)
4.9/5
(40)

With ____ mode, a trusted internal FTP client makes an outgoing request to the FTP server.

(Multiple Choice)
4.7/5
(34)

DNS ____ provide a mechanism to divide ownership responsibility among various DNS servers and the organizations they serve.

(Multiple Choice)
4.7/5
(29)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)