Exam 8: Application Security

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Which of the following was developed by Microsoft and was said to be safe due to cryptographically signed by the developer?

(Multiple Choice)
4.9/5
(42)

Which of the following uses a circles of trust?

(Multiple Choice)
4.9/5
(35)

Webserver programs often have components that come from different companies.

(True/False)
4.8/5
(39)

Which of the following is a signaling protocol?

(Multiple Choice)
4.8/5
(46)

In Microsoft Windows, the native webserver program is ________.

(Multiple Choice)
4.9/5
(34)

If an attacker enters more bytes into an area than it can accommodate, the extra is known as ________.

(Multiple Choice)
4.9/5
(34)

VoIP and the PSTN use different transport technology.

(True/False)
4.7/5
(37)

Which of the following provides end-to-end e-mail security?

(Multiple Choice)
4.7/5
(36)

________ uses multiple technologies to create dynamic client-side applications.

(Multiple Choice)
4.9/5
(39)

________ is an attack that involves sending modified SQL statements to a web application that will, in turn, modify a database.

(Multiple Choice)
4.9/5
(48)

PGP has had most success in person-to-person communication without corporate control.

(True/False)
4.9/5
(32)

________ is considered unsolicited commercial e-mail.

(Multiple Choice)
4.8/5
(39)

A goal of VoIP is to provide convergence.

(True/False)
4.7/5
(35)

Websites do not typically have the ability to log responses of various error messages.

(True/False)
4.9/5
(42)

A danger of website programming is accidentally allowing ________.

(Multiple Choice)
4.8/5
(39)

When a hacker is able to take over control of a host, nearly or completely, this indicates the hacker has ________.

(Multiple Choice)
4.8/5
(37)

What are Nikto, Paros Proxy, and Acunetix?

(Multiple Choice)
4.9/5
(28)

SIP proxy servers are used primarily in ________.

(Multiple Choice)
4.7/5
(29)

VoIP and the PSTN use different codecs.

(True/False)
4.8/5
(40)

________ are small programs and are probably the safest because many attack-related actions are disabled.

(Multiple Choice)
4.7/5
(31)
Showing 21 - 40 of 67
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)