Exam 12: Internet and World Wide Web Security
Exam 1: Network Security Fundamentals50 Questions
Exam 2: TCP-IP50 Questions
Exam 3: Network Traffic Signatures49 Questions
Exam 4: Routing Fundamentals50 Questions
Exam 5: Cryptography50 Questions
Exam 6: Wireless Network Fundamentals50 Questions
Exam 7: Understanding Wireless Security50 Questions
Exam 8: Intrusion Detection and Prevention Systems50 Questions
Exam 9: Firewalls50 Questions
Exam 10: Firewall Design and Management50 Questions
Exam 11: VPN Concepts50 Questions
Exam 12: Internet and World Wide Web Security50 Questions
Exam 13: Security Policy Design and Implementation50 Questions
Exam 14: On-Going Security Management50 Questions
Select questions type
What routing protocol is usually used on the Internet? Why is the information used by the protocol vulnerable to compromise?
Free
(Essay)
4.9/5
(39)
Correct Answer:
The Internet network is linked by routers.Routing protocols such as Border Gateway Protocol (BGP)are used to communicate information updates for routing tables.However,routing information is not authenticated,so it is vulnerable to compromise.Attackers could send modified routing updates that misdirect data to a destination of their choosing.With this data,they can launch DoS attacks,use IP spoofing to intercept packets,or launch man-in-the-middle attacks,in which the attacker's computer or router is placed between the source and destination of a communication to intercept and steal information.
MATCHING
-highly secure public facilities where commercial Internet backbones and ISPs exchange routing and traffic data
Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
C
What makes IP spoofing possible for computers on the Internet?
Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
B
Computers on the Internet are identified primarily by their IP address.
(True/False)
4.9/5
(29)
The _______________ Web Server is the most widely used Web server application.
(Short Answer)
4.8/5
(30)
MATCHING
-a protocol designed to improve DNS security by using cryptography to ensure DNS integrity and authentication
(Multiple Choice)
4.8/5
(47)
The lack of authentication for computers on the Internet make IP _____________ possible,which is a change in the IP addresses in the headers of malicious packets.
(Short Answer)
4.8/5
(37)
DNS _____________ poisoning steers unsuspecting victims to a server of the attacker's choice instead of the intended Web site.
(Short Answer)
4.8/5
(33)
What is the origin and structure of the Internet? Include some of the services it provides and the protocols they use.
(Essay)
4.8/5
(29)
MATCHING
-a network addressing scheme that allows DNS services to be decentralized among a group of servers,regardless of their location
(Multiple Choice)
4.8/5
(44)
What is the Internet backbone? Describe how routers work with the Internet backbone.
(Essay)
5.0/5
(29)
MATCHING
-a network architecture that divides DNS services between two servers
(Multiple Choice)
4.9/5
(39)
_______________________ is a name-resolution service that translates domain names to IP addresses.
(Short Answer)
4.8/5
(29)
Which of the following is a top-level digital certificate in the PKI chain?
(Multiple Choice)
4.9/5
(35)
MATCHING
-ISP facilities that provide connectivity to the Internet for business,education,and home users
(Multiple Choice)
4.9/5
(33)
List three of the steps you should take to close potential holes against SQL injection attacks.
(Essay)
4.7/5
(32)
A _______________ applet is a small program sometimes used as embedded code in Web pages.
(Short Answer)
4.8/5
(33)
The objective of a phishing attack is to entice e-mail recipients to click a bogus link where personal information can be stolen.
(True/False)
4.7/5
(38)
A critical buffer component is the function _________ and buffer overflows are usually aimed at this component.
(Short Answer)
4.8/5
(40)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)