Exam 8: Application Security
Exam 1: The Threat Environment103 Questions
Exam 2: Planning and Policy124 Questions
Exam 3: Cryptography122 Questions
Exam 4: Secure Networks119 Questions
Exam 5: Access Control124 Questions
Exam 6: Firewalls100 Questions
Exam 7: Host Hardening100 Questions
Exam 8: Application Security100 Questions
Exam 9: Data Protection108 Questions
Exam 10: Incident and Disaster Response107 Questions
Exam 11: Module A: Networking Concepts91 Questions
Select questions type
The prevention of sensitive information from being sent out of a company is called ________.
(Multiple Choice)
4.9/5
(37)
In a(n) ________ attack, information that a user enters is sent back to the user in a webpage.
(Multiple Choice)
4.7/5
(38)
If NAT changes the Layer 3 IP destination addresses, the protocol will still work properly.
(True/False)
4.8/5
(33)
DNS, DHCP, and LDAP are examples of supervisory protocols in TCP/IP.
(True/False)
4.8/5
(32)
Which of the following is the most dangerous because it can do more on a computer when it is executed?
(Multiple Choice)
4.8/5
(33)
Someone breaks into a corporate VoIP system to place free long-distance and international toll calls. This is referred to by security professionals as ________.
(Multiple Choice)
4.7/5
(34)
Which version of SNMP allows the manager to have a different shared secret with each agent?
(Multiple Choice)
4.9/5
(38)
When securing application configuration settings, default password settings should not be changed.
(True/False)
4.8/5
(31)
Companies are responsible for filtering sexually or racially harassing messages and can be sued for not doing so.
(True/False)
4.8/5
(42)
Blind SQL injection uses a series of SQL statements that produce different responses based on true/false questions, or timed responses.
(True/False)
4.8/5
(35)
In Internet Explorer, the Security tab controls the website's pop-up blocker.
(True/False)
5.0/5
(31)
Showing 21 - 40 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)