Exam 13: Programming Exploits

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The design flaw in ActiveX is that ActiveX can do anything the user can do.

Free
(True/False)
4.8/5
(38)
Correct Answer:
Verified

True

____________________, Microsoft's answer to Netscape's JavaScript language, is loosely based on the Visual Basic programming language, but is much simpler.

Free
(Short Answer)
4.9/5
(30)
Correct Answer:
Verified

VBScript

____________________ controls are Component Object Model (COM) objects that can be embedded in a variety of applications.

Free
(Short Answer)
4.9/5
(37)
Correct Answer:
Verified

ActiveX

SSL encrypts the session, as well as the data that is being used in the session, using ____.

(Multiple Choice)
4.8/5
(35)

______________________________ is the most basic script used to develop Web pages and uses a set of markup tags, such as , to define the structure of Web pages.

(Short Answer)
4.9/5
(34)

How can attackers use ActiveX to modify resources on an implementation of Windows?

(Essay)
4.9/5
(35)

During the early days of the Internet, most Web pages were static HTML, so programming exploits could only be aimed at the client-side browsers.

(True/False)
4.9/5
(34)

HTML is a dynamic language, and can be executed successfully outside a Web browser.

(True/False)
4.8/5
(39)

The ____ vulnerability exploits an unchecked buffer in Internet Explorer processing HTML elements such as FRAME and IFRAME elements.

(Multiple Choice)
4.8/5
(37)

One of the least common exploits used on the Internet is a buffer overflow.

(True/False)
4.8/5
(38)

Up until ____, when Microsoft issued the patch that disables autoplay of ActiveX controls, ActiveX was becoming a widespread way to perform surreptitious installation of spyware and adware on Windows machines.

(Multiple Choice)
4.8/5
(30)

What is the difference between a script and a programming language?

(Essay)
4.8/5
(33)

Secure transfer of data has been made available by protocols such as ____.

(Multiple Choice)
4.8/5
(42)

What security measures regarding ActiveX should you take if you are running Windows 2000 or Windows XP?

(Essay)
4.9/5
(33)

_________________________ are the defects in various programming languages that are used to develop server-side and client-side applications.

(Short Answer)
4.8/5
(32)

Java is designed to run in a platform-independent manner using _________________________ installed on the client computer as its sandbox.

(Short Answer)
4.8/5
(31)

____ controls are stand-alone compiled applications designed to make it possible to link and allow interactions between variously developed applications.

(Multiple Choice)
4.8/5
(36)

The COM architecture was first released with Windows XP.

(True/False)
4.8/5
(38)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)