Exam 8: Application Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

H.323 uses Ports 1719 and 1720

(True/False)
4.7/5
(37)

The prevention of sensitive information from being sent out of a company is called ________.

(Multiple Choice)
4.9/5
(37)

In a(n) ________ attack, information that a user enters is sent back to the user in a webpage.

(Multiple Choice)
4.7/5
(38)

If NAT changes the Layer 3 IP destination addresses, the protocol will still work properly.

(True/False)
4.8/5
(33)

In a URL, ".." (without the quotes) means ________.

(Multiple Choice)
4.8/5
(40)

To prevent eavesdropping, applications should ________.

(Multiple Choice)
4.9/5
(40)

DNS, DHCP, and LDAP are examples of supervisory protocols in TCP/IP.

(True/False)
4.8/5
(32)

RTP stands for ________.

(Multiple Choice)
4.9/5
(45)

Which of the following is the most dangerous because it can do more on a computer when it is executed?

(Multiple Choice)
4.8/5
(33)

Java applets are large Java programs.

(True/False)
5.0/5
(34)

Someone breaks into a corporate VoIP system to place free long-distance and international toll calls. This is referred to by security professionals as ________.

(Multiple Choice)
4.7/5
(34)

Which version of SNMP allows the manager to have a different shared secret with each agent?

(Multiple Choice)
4.9/5
(38)

PKI uses circles of trust.

(True/False)
4.8/5
(26)

Operating system account passwords provide limited protection.

(True/False)
4.9/5
(34)

When securing application configuration settings, default password settings should not be changed.

(True/False)
4.8/5
(31)

Skype can decrypt and read user traffic.

(True/False)
4.9/5
(34)

SIP proxy servers are used in ________.

(Multiple Choice)
4.7/5
(38)

Companies are responsible for filtering sexually or racially harassing messages and can be sued for not doing so.

(True/False)
4.8/5
(42)

Blind SQL injection uses a series of SQL statements that produce different responses based on true/false questions, or timed responses.

(True/False)
4.8/5
(35)

In Internet Explorer, the Security tab controls the website's pop-up blocker.

(True/False)
5.0/5
(31)
Showing 21 - 40 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)