Deck 15: Web Application Vulnerabilities
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/18
Play
Full screen (f)
Deck 15: Web Application Vulnerabilities
1
The protocols upon which the Internet rest are, by nature, secure.
False
2
In 2007 the average time between bringing an unsecured server (or client) onto the Internet, and its being infected by one of the thousands of circulating Internet worms, is less than 2 minutes.
False
3
A set of passwords is better than just one password because even the strongest password can be cracked, given sufficient time.
True
4
The majority of network traffic on the Web is encrypted.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
5
It is a proven fact that outsiders perpetrate most computer crimes.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
6
HTTP error code ____ means the server is looking for an encryption key from the client or is responding to a bad password entry.
A)400
B)401
C)403
D)408
A)400
B)401
C)403
D)408
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
7
HTTP error code ____ means the client stopped the request before the server finished retrieving it.
A)400
B)401
C)403
D)408
A)400
B)401
C)403
D)408
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
8
The open-source Mambo project is a content management system built on ____.
A)C++
B)Java
C)PHP
D))NET
A)C++
B)Java
C)PHP
D))NET
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
9
The two most widely used Web server applications are ____ and Microsoft Internet Information Server (IIS).
A)Apache
B)WebSphere
C)Web Zone
D)OpenWeb
A)Apache
B)WebSphere
C)Web Zone
D)OpenWeb
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
10
The ____ dialog in a browser allows you to view the pages you have visited in the last user-defined number of days.
A)bookmarks
B)history file
C)cookies
D)cache
A)bookmarks
B)history file
C)cookies
D)cache
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
11
____________________ is very complicated and intended to supply the base for all subsequent application layer and presentation layer software.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
12
A(n) _________________________ is a neutral zone between the private LAN and the public network of an organization.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
13
___________________________________ facilities allow you to monitor all user activity on your private development machine and also to keep a record of Web server logs on a protected machine.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
14
The most common source of Web-browser exploits is _________________________.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
15
A(n) ____________________ is a small text file, stored on your computer by Web servers, that contains information about the last session when you visited the site.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
16
What are some of the factors that lead to vulnerability of data and applications on the Web?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
17
What are some of the tools used to exploit Web vulnerability?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
18
What are some of the most important Web server vulnerabilities?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck