Exam 11: Networked Applications

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Tor was created to improve ________.

(Multiple Choice)
4.8/5
(33)

In SQL injection attacks,the attacker sends ________.

(Multiple Choice)
4.9/5
(29)

Typically,the most common way for an attacker to get extensive privileges on a computer is to ________.

(Multiple Choice)
4.9/5
(19)

Mail servers communicate with each other by using ________.

(Multiple Choice)
4.7/5
(36)

The attack on GHOSTNET began with ________.

(Multiple Choice)
4.8/5
(30)

A traditional e-mail user sending messages to his or her mail server would most likely use ________.

(Multiple Choice)
4.8/5
(42)

E-mail bodies that have non-English text use ________.

(Multiple Choice)
4.8/5
(49)

Tor provides confidentiality ________.

(Multiple Choice)
5.0/5
(37)

A lesson of XSS is that programmers should never trust ________.

(Multiple Choice)
4.9/5
(37)

In XSS,the malicious script that gets placed in a webpage sent to a target is ________.

(Multiple Choice)
4.8/5
(31)

Speech codecs ________.

(Multiple Choice)
4.9/5
(38)

According to the principle of defense in depth,antivirus filtering should be done in at least ________ location(s).

(Multiple Choice)
4.9/5
(35)

In BitTorrent,a(n)________ website is a site the BitTorrent client program goes to in order to get .torrent files.

(Multiple Choice)
4.8/5
(34)

Which of the following is a security risk associated with BitTorrent?

(Multiple Choice)
4.8/5
(40)

In BitTorrent,a(n)________ is a server that coordinates the file transfer.

(Multiple Choice)
4.9/5
(35)

How many HTTP request-response cycles are needed to transfer a webpage containing 88 lines of text and three different images?

(Multiple Choice)
4.7/5
(32)

Which of the following is NOT one of the main elements of the Skype network?

(Multiple Choice)
4.7/5
(33)

Which of the following steps are done in order during a call with Skype?

(Multiple Choice)
4.8/5
(37)

Which of the following signaling standards is likely to dominate in VoIP?

(Multiple Choice)
4.8/5
(38)

Which of the following is considered a bigger problem with traditional client/server based architectures than with peer-to-peer architectures?

(Multiple Choice)
4.9/5
(43)
Showing 21 - 40 of 62
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)