Exam 12: Internet and World Wide Web Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What routing protocol is usually used on the Internet? Why is the information used by the protocol vulnerable to compromise?

Free
(Essay)
4.9/5
(39)
Correct Answer:
Verified

The Internet network is linked by routers.Routing protocols such as Border Gateway Protocol (BGP)are used to communicate information updates for routing tables.However,routing information is not authenticated,so it is vulnerable to compromise.Attackers could send modified routing updates that misdirect data to a destination of their choosing.With this data,they can launch DoS attacks,use IP spoofing to intercept packets,or launch man-in-the-middle attacks,in which the attacker's computer or router is placed between the source and destination of a communication to intercept and steal information.

MATCHING -highly secure public facilities where commercial Internet backbones and ISPs exchange routing and traffic data

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

C

What makes IP spoofing possible for computers on the Internet?

Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
Verified

B

Computers on the Internet are identified primarily by their IP address.

(True/False)
4.9/5
(29)

The _______________ Web Server is the most widely used Web server application.

(Short Answer)
4.8/5
(30)

MATCHING -a protocol designed to improve DNS security by using cryptography to ensure DNS integrity and authentication

(Multiple Choice)
4.8/5
(47)

The lack of authentication for computers on the Internet make IP _____________ possible,which is a change in the IP addresses in the headers of malicious packets.

(Short Answer)
4.8/5
(37)

What is a zone transfer?

(Multiple Choice)
4.7/5
(36)

DNS _____________ poisoning steers unsuspecting victims to a server of the attacker's choice instead of the intended Web site.

(Short Answer)
4.8/5
(33)

What is the origin and structure of the Internet? Include some of the services it provides and the protocols they use.

(Essay)
4.8/5
(29)

MATCHING -a network addressing scheme that allows DNS services to be decentralized among a group of servers,regardless of their location

(Multiple Choice)
4.8/5
(44)

What is the Internet backbone? Describe how routers work with the Internet backbone.

(Essay)
5.0/5
(29)

MATCHING -a network architecture that divides DNS services between two servers

(Multiple Choice)
4.9/5
(39)

_______________________ is a name-resolution service that translates domain names to IP addresses.

(Short Answer)
4.8/5
(29)

Which of the following is a top-level digital certificate in the PKI chain?

(Multiple Choice)
4.9/5
(35)

MATCHING -ISP facilities that provide connectivity to the Internet for business,education,and home users

(Multiple Choice)
4.9/5
(33)

List three of the steps you should take to close potential holes against SQL injection attacks.

(Essay)
4.7/5
(32)

A _______________ applet is a small program sometimes used as embedded code in Web pages.

(Short Answer)
4.8/5
(33)

The objective of a phishing attack is to entice e-mail recipients to click a bogus link where personal information can be stolen.

(True/False)
4.7/5
(38)

A critical buffer component is the function _________ and buffer overflows are usually aimed at this component.

(Short Answer)
4.8/5
(40)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)