Exam 12: Internet and World Wide Web Security
Exam 1: Network Security Fundamentals50 Questions
Exam 2: TCP-IP50 Questions
Exam 3: Network Traffic Signatures49 Questions
Exam 4: Routing Fundamentals50 Questions
Exam 5: Cryptography50 Questions
Exam 6: Wireless Network Fundamentals50 Questions
Exam 7: Understanding Wireless Security50 Questions
Exam 8: Intrusion Detection and Prevention Systems50 Questions
Exam 9: Firewalls50 Questions
Exam 10: Firewall Design and Management50 Questions
Exam 11: VPN Concepts50 Questions
Exam 12: Internet and World Wide Web Security50 Questions
Exam 13: Security Policy Design and Implementation50 Questions
Exam 14: On-Going Security Management50 Questions
Select questions type
The Internet tier system starts with a backbone network connected via _____________________ to regional Internet service providers.
(Short Answer)
5.0/5
(42)
Windows Basic Authentication requires that users enter a username and password and the password is transmitted using a hashing algorithm.
(True/False)
4.8/5
(36)
What is the DNS hierarchical system? Include a discussion of root servers in your answer.
(Essay)
4.9/5
(46)
Which of the following is NOT a recommended security setting for Apache Web servers?
(Multiple Choice)
4.8/5
(35)
Which of the following is NOT a step you should take to prevent attackers from exploiting SQL security holes?
(Multiple Choice)
4.8/5
(34)
The goal of _____________ is to provide authentication of DNS data and ensure integrity of DNS data.
(Short Answer)
4.9/5
(40)
Which of the following is a highly secure public facility in which backbones have interconnected data lines and routers that exchange routing and traffic data?
(Multiple Choice)
4.8/5
(33)
What type of DNS server is authoritative for a specific domain?
(Multiple Choice)
4.8/5
(41)
MATCHING
-the communication of a zone file from the primary DNS server to secondary DNS servers for updating
(Multiple Choice)
4.9/5
(42)
What type of attack involves plaintext scripting that affects databases?
(Multiple Choice)
4.9/5
(45)
Which variation on phishing modifies the user's host file to redirect traffic?
(Multiple Choice)
4.9/5
(33)
What type of attack displays false information masquerading as legitimate data?
(Multiple Choice)
4.9/5
(40)
MATCHING
-a variation of phishing that intercepts traffic to a legitimate Web site and redirects it to a phony replica site
(Multiple Choice)
5.0/5
(35)
The term Internet and World Wide Web are different terms that mean the same thing.
(True/False)
4.7/5
(41)
___________ direct network traffic to its destination on the Internet using tables and protocols.
(Short Answer)
4.7/5
(36)
What type of attack exploits a lack of bounds checking on the size of data stored in an array?
(Multiple Choice)
4.7/5
(40)
Which aspect of hardening a Windows Web server allows you to restrict access to the web server based on IP address?
(Multiple Choice)
4.9/5
(35)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)