Exam 8: Security of Web Applications
Exam 1: Introduction to Information Security50 Questions
Exam 2: Introduction to Networking50 Questions
Exam 3: Cryptography50 Questions
Exam 4: Firewall Technologies and Administration50 Questions
Exam 5: Network Authentication and Remote Access Using Vpn50 Questions
Exam 6: Network Monitoring and Intrusion Detection and Prevention Systems50 Questions
Exam 7: Wireless Network Security49 Questions
Exam 8: Security of Web Applications50 Questions
Exam 9: Network Vulnerability Assessment49 Questions
Exam 10: Auditing, Monitoring, and Logging50 Questions
Exam 11: Contingency Planning and Networking Incident Response50 Questions
Exam 12: Digital Forensics50 Questions
Select questions type
What is the best way to make sure data is properly encrypted while in transit?
Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
C
____ is a key component of the Web, working in conjunction with HTTP to move content from servers to clients.
Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
B
Match each item with a statement below.
a.Telnet
f.CGI
b.SNMP
g.Perl
c.NNTP
h.PHP
d.CSS
i.CSRF
e.XML
-Developed in 1987 by Larry Wall as an interpreted language (based on C syntax) that helps provide a more robust scripting capability for UNIX.
Free
(Short Answer)
4.8/5
(28)
Correct Answer:
G
The ____________________ is a set of applications (the software) that runs on top of the Internet.
(Short Answer)
5.0/5
(40)
A major problem with FTP is that data is transferred in ____.
(Multiple Choice)
4.8/5
(38)
To provide monitoring, an SNMP ____ must be installed on a desired host or network device.
(Multiple Choice)
4.8/5
(39)
Match each item with a statement below.
a.Telnet
f.CGI
b.SNMP
g.Perl
c.NNTP
h.PHP
d.CSS
i.CSRF
e.XML
-An extension to HTML that allows developers to define their own tags for structure.
(Short Answer)
4.8/5
(33)
An SMTP ____ is a simple message providing status information about the monitored device.
(Multiple Choice)
4.7/5
(37)
List five best practices a Web system administrators should use to secure a Web server.
(Essay)
4.7/5
(36)
A sender with a valid internal IP address should be allowed to send e-mail to external e-mail addresses.
(True/False)
4.8/5
(37)
____ is a simple method of transferring files between computer systems.
(Multiple Choice)
4.8/5
(41)
In passive mode, the FTP client must listen and wait for the server connection.
(True/False)
4.9/5
(40)
With ____ mode, a trusted internal FTP client makes an outgoing request to the FTP server.
(Multiple Choice)
4.7/5
(34)
DNS ____ provide a mechanism to divide ownership responsibility among various DNS servers and the organizations they serve.
(Multiple Choice)
4.7/5
(29)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)