Exam 8: Application Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

On a compromised computer, if you mistype the name of a URL, you may be taken to a malicious website even if you set your browser security to high.

(True/False)
4.8/5
(41)

When executing attack code, if the attacker has skillfully overwritten the return address, the return address will not point back to "data" in the buffer.

(True/False)
4.8/5
(35)

Programmers can trust user input if the person is strongly authenticated.

(True/False)
4.9/5
(36)

Like the public switched telephone network, VoIP technology is a closed system.

(True/False)
4.9/5
(35)

To satisfy legal retention and other compliance regulations, companies should use ________ in IM.

(Multiple Choice)
4.7/5
(33)

Developers have permissions on the ________.

(Multiple Choice)
4.8/5
(35)

Scripts do not have the ability to permanently change your computer registry.

(True/False)
4.8/5
(38)

Accepting cookies is necessary to use many websites.

(True/False)
4.8/5
(27)

Spam over VoIP is called ________.

(Multiple Choice)
4.9/5
(32)

________ is a VoIP service that currently offers free calling among its customers over the Internet and reduced-cost calling to and from Public Switched Telephone Network customers.

(Multiple Choice)
4.7/5
(34)

Custom programs generally are safe because attackers do not know the code.

(True/False)
4.9/5
(29)

Firewall port openings are required for SIP/H.323 messages.

(True/False)
4.7/5
(36)

Generally speaking, vendors use similar mechanisms for downloading and installing patches.

(True/False)
4.9/5
(28)

The Skype protocol is relatively easy for corporate firewalls to filter.

(True/False)
4.8/5
(31)

Eavesdropping can be thwarted by encrypting ________.

(Multiple Choice)
4.8/5
(30)

Which comes third in a VoIP packet?

(Multiple Choice)
4.7/5
(36)

A VoIP caller wishing to contact another sends an INVITE message to ________.

(Multiple Choice)
4.9/5
(37)

SSL/TLS provides security ________.

(Multiple Choice)
4.9/5
(32)

The user reaches a webpage before logging in. This is a(n) ________ attack.

(Multiple Choice)
4.8/5
(32)

What e-mail standard provides end-to-end security?

(Multiple Choice)
4.9/5
(42)
Showing 41 - 60 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)