Exam 8: Application Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is not a signaling protocol?

(Multiple Choice)
4.9/5
(30)

Under what Internet Options tabs are cookies controlled?

(Multiple Choice)
4.9/5
(28)

Most firms do a satisfactory job overseeing the deployment of custom programs used to supplement packaged software.

(True/False)
4.8/5
(37)

In IM, ________ servers allow two users to locate each other.

(Multiple Choice)
4.8/5
(25)

E-mail filtering can be done at which of the following?

(Multiple Choice)
4.9/5
(43)

If a hacker takes over an application program, he or she receives the permissions with which the program runs.

(True/False)
4.9/5
(29)

________ introduced community strings for security, in which a shared secret was used to authenticate messages.

(Multiple Choice)
4.8/5
(41)

An attacker types more data in a field than the programmer expected. This is a(n) ________ attack.

(Multiple Choice)
4.9/5
(33)

Which of the following uses a PKI?

(Multiple Choice)
4.8/5
(37)

Testers have permissions on the ________.

(Multiple Choice)
4.8/5
(38)

Compared to full programming languages, scripts are ________ in what they can do.

(Multiple Choice)
4.8/5
(25)

Transport consists of communication to manage the network.

(True/False)
4.9/5
(29)

Spammers use sticky spam, which presents their message as a graphical image.

(True/False)
4.9/5
(37)

In a(n) ________ attack, the user enters part of a database query instead of giving the expected input.

(Multiple Choice)
4.9/5
(32)

RTP is used in ________.

(Multiple Choice)
4.9/5
(36)

The most popular way for hackers to take over hosts today is ________.

(Multiple Choice)
4.9/5
(39)

Spammers are one reason that some companies have outsourced e-mail filtering.

(True/False)
4.8/5
(34)

VoIP traffic and data traffic tend to be segregated from each other on a network for added security.

(Multiple Choice)
4.9/5
(29)

Which of the following are reasons to ensure WWW Service and E-Commerce security?

(Multiple Choice)
4.8/5
(40)

A PSTN gateway translates between a VoIP network's ________ protocols and those of the public switched telephone network.

(Multiple Choice)
4.8/5
(34)
Showing 61 - 80 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)