Exam 3: Application and Networking-Based Attacks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Because the XSS is a widely known attack, the number of Web sites that are vulnerable is very small.

(True/False)
4.7/5
(26)

An attack in which the attacker attempts to impersonate the user by using his or her session token is known as:

(Multiple Choice)
4.9/5
(46)

Which type of attack below is similar to a passive man-in-the-middle attack?

(Multiple Choice)
4.8/5
(31)

What language below is used to view and manipulate data that is stored in a relational database?

(Multiple Choice)
4.8/5
(33)

Which SQL injection statement example below could be used to discover the name of the table?

(Multiple Choice)
4.9/5
(32)

Which SQL statement represents a SQL injection attempt to determine the names of different fields in a database?

(Multiple Choice)
4.7/5
(34)

The exchange of information among DNS servers regarding configured zones is known as:

(Multiple Choice)
4.7/5
(29)

The default root directory of the Microsoft Internet Information Services (IIS) Web server is located at which directory below?

(Multiple Choice)
4.8/5
(41)

The predecessor to today's Internet was a network known as ____________________.

(Short Answer)
4.8/5
(34)

What is a cookie, and how is it used?​

(Essay)
5.0/5
(30)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)