Exam 8: Application Security

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

________ can be used to track users at a website.

(Multiple Choice)
4.8/5
(45)

A common type of buffer overflow is the stack overflow.

(True/False)
4.9/5
(36)

Compared to full programming languages, scripts ________.

(Multiple Choice)
4.9/5
(32)

There are some programs that must run with root privileges.

(True/False)
4.9/5
(34)

________ is when one user's input can appear on the page of another user.

(Multiple Choice)
4.8/5
(34)

________ occurs when attackers take over a computer and produce false web pages.

(Multiple Choice)
4.9/5
(38)

Spam over IP telephony is called ________.

(Multiple Choice)
4.8/5
(39)

With directory traversal, the path ________ would allow an attacker to download the passwd file in the etc directory (on a Unix computer).

(Multiple Choice)
4.8/5
(36)

Firms with rigorous deployment policies use all of the following EXCEPT ________ for that purpose.

(Multiple Choice)
4.9/5
(36)

Which of the following is FALSE about cookies?

(Multiple Choice)
4.9/5
(36)

Many websites require users to have Active-X turned on.

(True/False)
4.7/5
(44)

When someone speaks, a(n) ________ in the VoIP phone converts the voice into a stream of digital bytes.

(Multiple Choice)
4.9/5
(31)

After a program has been fully tested, it should be moved to a production server.

(True/False)
4.8/5
(38)

In the Internet Options dialog box, the ________ tab lets you control what information is released to websites.

(Multiple Choice)
4.8/5
(35)

Typing URLs with ________ in them can give access to sensitive directories.

(Multiple Choice)
4.8/5
(40)

Many firms filter incoming e-mail messages and some filter outgoing messages as well.

(True/False)
4.9/5
(41)

Under which of the following tabs in the Internet Options dialog box are cookies controlled?

(Multiple Choice)
4.9/5
(32)

The more popular scripting languages for mobile code are VBScript and JavaScript.

(True/False)
4.9/5
(43)

Which of the following is considered quite powerful and can do almost anything on the client machine?

(Multiple Choice)
4.7/5
(34)

The dynamic nature of Ajax makes it susceptible to malicious code injection.

(True/False)
4.8/5
(36)
Showing 41 - 60 of 67
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)