Exam 12: Internet and World Wide Web Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The Internet tier system starts with a backbone network connected via _____________________ to regional Internet service providers.

(Short Answer)
5.0/5
(42)

Windows Basic Authentication requires that users enter a username and password and the password is transmitted using a hashing algorithm.

(True/False)
4.8/5
(36)

What is the DNS hierarchical system? Include a discussion of root servers in your answer.

(Essay)
4.9/5
(46)

How can you harden a DNS server using the split DNS architecture?

(Essay)
4.9/5
(38)

Which of the following is NOT a recommended security setting for Apache Web servers?

(Multiple Choice)
4.8/5
(35)

Which of the following is NOT a step you should take to prevent attackers from exploiting SQL security holes?

(Multiple Choice)
4.8/5
(34)

The goal of _____________ is to provide authentication of DNS data and ensure integrity of DNS data.

(Short Answer)
4.9/5
(40)

Which of the following is a highly secure public facility in which backbones have interconnected data lines and routers that exchange routing and traffic data?

(Multiple Choice)
4.8/5
(33)

What type of DNS server is authoritative for a specific domain?

(Multiple Choice)
4.8/5
(41)

How can you provide data confidentiality for your IIS Web server?

(Essay)
4.9/5
(42)

MATCHING -the communication of a zone file from the primary DNS server to secondary DNS servers for updating

(Multiple Choice)
4.9/5
(42)

What type of attack involves plaintext scripting that affects databases?

(Multiple Choice)
4.9/5
(45)

Which variation on phishing modifies the user's host file to redirect traffic?

(Multiple Choice)
4.9/5
(33)

What type of attack displays false information masquerading as legitimate data?

(Multiple Choice)
4.9/5
(40)

MATCHING -a variation of phishing that intercepts traffic to a legitimate Web site and redirects it to a phony replica site

(Multiple Choice)
5.0/5
(35)

The term Internet and World Wide Web are different terms that mean the same thing.

(True/False)
4.7/5
(41)

___________ direct network traffic to its destination on the Internet using tables and protocols.

(Short Answer)
4.7/5
(36)

What is a buffer overflow attack?

(Essay)
4.9/5
(38)

What type of attack exploits a lack of bounds checking on the size of data stored in an array?

(Multiple Choice)
4.7/5
(40)

Which aspect of hardening a Windows Web server allows you to restrict access to the web server based on IP address?

(Multiple Choice)
4.9/5
(35)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)