Exam 17: Web Components

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

With the RSA and Diffie-Hellman handshakes

Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
Verified

B

HTTP uses TCP port 8080.

Free
(True/False)
4.8/5
(28)
Correct Answer:
Verified

False

The Terms RC4 and 3DES refer to

Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
Verified

B

The presence of the keyword "secure" in a cookie indicates that it can only be accessed by the web site that placed it there in the first place.

(True/False)
4.8/5
(37)

_______________ are small chunks of ASCII text passed within an HTTP stream to store data temporarily in a web browser instance.

(Short Answer)
4.8/5
(31)

Authenticode is used to encrypt program code so that it is more difficult for hackers to reverse engineer it.

(True/False)
4.8/5
(38)

What are some security issues related to web-based applications?

(Essay)
4.9/5
(40)

What are some of the security issues associated with web applications and plug-ins?

(Essay)
4.9/5
(29)

Which of the following URL segments signifies that it is secure for transmission over the Internet?

(Multiple Choice)
4.9/5
(38)

What are some of the security concerns regarding scripting?

(Essay)
4.8/5
(35)

_______________ was the original method for having a web server execute a program outside the web server process but on the same server.

(Short Answer)
4.8/5
(41)

CVE provides security personnel with a common language to use when discussing vulnerabilities.

(True/False)
4.9/5
(30)

Running Java applets from the Web on your system is considered

(Multiple Choice)
4.8/5
(48)

Common Gateway Interface (CGI)security issues include

(Multiple Choice)
4.7/5
(23)

To enable interoperability the __________ standard was created as a standard for directory services.

(Short Answer)
4.9/5
(32)

The SFTP protocol incorporates what into FTP?

(Multiple Choice)
4.8/5
(42)

_______________ is using an embedded control from another site with or without the other site's permission.

(Short Answer)
4.8/5
(41)

Using SSL protects your data from interception by devices such as key loggers.

(True/False)
4.8/5
(38)

Which are the most common exploit used to hack into a system?

(Multiple Choice)
4.8/5
(39)

As a network administrator,what are some of the options you have for providing secure file transfer?

(Essay)
4.8/5
(35)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)