Exam 15: Web Application Vulnerabilities

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

HTTP error code ____ means the client stopped the request before the server finished retrieving it.

Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
Verified

D

The majority of network traffic on the Web is encrypted.

Free
(True/False)
4.8/5
(29)
Correct Answer:
Verified

False

The ____ dialog in a browser allows you to view the pages you have visited in the last user-defined number of days.

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

B

A set of passwords is better than just one password because even the strongest password can be cracked, given sufficient time.

(True/False)
4.9/5
(32)

The protocols upon which the Internet rest are, by nature, secure.

(True/False)
4.7/5
(31)

What are some of the factors that lead to vulnerability of data and applications on the Web?

(Essay)
4.8/5
(35)

It is a proven fact that outsiders perpetrate most computer crimes.

(True/False)
4.9/5
(41)

A(n) _________________________ is a neutral zone between the private LAN and the public network of an organization.

(Short Answer)
4.8/5
(40)

____________________ is very complicated and intended to supply the base for all subsequent application layer and presentation layer software.

(Short Answer)
4.9/5
(32)

The two most widely used Web server applications are ____ and Microsoft Internet Information Server (IIS).

(Multiple Choice)
4.9/5
(35)

The most common source of Web-browser exploits is _________________________.

(Short Answer)
4.8/5
(30)

What are some of the tools used to exploit Web vulnerability?

(Essay)
4.7/5
(24)

The open-source Mambo project is a content management system built on ____.

(Multiple Choice)
4.9/5
(32)

HTTP error code ____ means the server is looking for an encryption key from the client or is responding to a bad password entry.

(Multiple Choice)
4.7/5
(33)

___________________________________ facilities allow you to monitor all user activity on your private development machine and also to keep a record of Web server logs on a protected machine.

(Short Answer)
4.9/5
(23)

A(n) ____________________ is a small text file, stored on your computer by Web servers, that contains information about the last session when you visited the site.

(Short Answer)
4.7/5
(40)

What are some of the most important Web server vulnerabilities?

(Essay)
4.7/5
(30)

In 2007 the average time between bringing an unsecured server (or client) onto the Internet, and its being infected by one of the thousands of circulating Internet worms, is less than 2 minutes.

(True/False)
4.9/5
(35)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)