Deck 13: Programming Exploits

Full screen (f)
exit full mode
Question
During the early days of the Internet, most Web pages were static HTML, so programming exploits could only be aimed at the client-side browsers.
Use Space or
up arrow
down arrow
to flip the card.
Question
The design flaw in ActiveX is that ActiveX can do anything the user can do.
Question
The COM architecture was first released with Windows XP.
Question
One of the least common exploits used on the Internet is a buffer overflow.
Question
HTML is a dynamic language, and can be executed successfully outside a Web browser.
Question
____ controls are stand-alone compiled applications designed to make it possible to link and allow interactions between variously developed applications.

A)ActiveX
B)Applets
C)Java widgets
D)VBScript
Question
Up until ____, when Microsoft issued the patch that disables autoplay of ActiveX controls, ActiveX was becoming a widespread way to perform surreptitious installation of spyware and adware on Windows machines.

A)2000
B)2001
C)2003
D)2006
Question
The ____ vulnerability exploits an unchecked buffer in Internet Explorer processing HTML elements such as FRAME and IFRAME elements.

A)phishing
B)buffer overflow
C)HTML e-mail
D)remote access
Question
Secure transfer of data has been made available by protocols such as ____.

A)FTP
B)HTTP
C)SSL
D)TCP
Question
SSL encrypts the session, as well as the data that is being used in the session, using ____.

A)PKI
B)VPN
C)TLS
D)HTTPS
Question
_________________________ are the defects in various programming languages that are used to develop server-side and client-side applications.
Question
____________________ controls are Component Object Model (COM) objects that can be embedded in a variety of applications.
Question
____________________, Microsoft's answer to Netscape's JavaScript language, is loosely based on the Visual Basic programming language, but is much simpler.
Question
______________________________ is the most basic script used to develop Web pages and uses a set of markup tags, such as , to define the structure of Web pages.
Question
Java is designed to run in a platform-independent manner using _________________________ installed on the client computer as its sandbox.
Question
What is the difference between a script and a programming language?
Question
How can attackers use ActiveX to modify resources on an implementation of Windows?
Question
What security measures regarding ActiveX should you take if you are running Windows 2000 or Windows XP?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/18
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 13: Programming Exploits
1
During the early days of the Internet, most Web pages were static HTML, so programming exploits could only be aimed at the client-side browsers.
True
2
The design flaw in ActiveX is that ActiveX can do anything the user can do.
True
3
The COM architecture was first released with Windows XP.
False
4
One of the least common exploits used on the Internet is a buffer overflow.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
5
HTML is a dynamic language, and can be executed successfully outside a Web browser.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
6
____ controls are stand-alone compiled applications designed to make it possible to link and allow interactions between variously developed applications.

A)ActiveX
B)Applets
C)Java widgets
D)VBScript
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
7
Up until ____, when Microsoft issued the patch that disables autoplay of ActiveX controls, ActiveX was becoming a widespread way to perform surreptitious installation of spyware and adware on Windows machines.

A)2000
B)2001
C)2003
D)2006
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
8
The ____ vulnerability exploits an unchecked buffer in Internet Explorer processing HTML elements such as FRAME and IFRAME elements.

A)phishing
B)buffer overflow
C)HTML e-mail
D)remote access
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
9
Secure transfer of data has been made available by protocols such as ____.

A)FTP
B)HTTP
C)SSL
D)TCP
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
10
SSL encrypts the session, as well as the data that is being used in the session, using ____.

A)PKI
B)VPN
C)TLS
D)HTTPS
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
11
_________________________ are the defects in various programming languages that are used to develop server-side and client-side applications.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
12
____________________ controls are Component Object Model (COM) objects that can be embedded in a variety of applications.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
13
____________________, Microsoft's answer to Netscape's JavaScript language, is loosely based on the Visual Basic programming language, but is much simpler.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
14
______________________________ is the most basic script used to develop Web pages and uses a set of markup tags, such as , to define the structure of Web pages.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
15
Java is designed to run in a platform-independent manner using _________________________ installed on the client computer as its sandbox.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
16
What is the difference between a script and a programming language?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
17
How can attackers use ActiveX to modify resources on an implementation of Windows?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
18
What security measures regarding ActiveX should you take if you are running Windows 2000 or Windows XP?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 18 flashcards in this deck.