Deck 12: Internet and World Wide Web Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 12: Internet and World Wide Web Security
1
What type of attack displays false information masquerading as legitimate data?
A) Java applet
B) phishing
C) buffer overflow
D) SQL injection
A) Java applet
B) phishing
C) buffer overflow
D) SQL injection
B
2
Which variation on phishing modifies the user's host file to redirect traffic?
A) spear phishing
B) pharming
C) DNS phishing
D) hijacking
A) spear phishing
B) pharming
C) DNS phishing
D) hijacking
B
3
What feature of the 13 DNS root servers enables any group of servers to act as a root server?
A) multicast addressing
B) broadcast addressing
C) anycast addressing
D) unicast addressing
A) multicast addressing
B) broadcast addressing
C) anycast addressing
D) unicast addressing
C
4
Which of the following is a top-level digital certificate in the PKI chain?
A) security-aware resolver
B) trust anchor
C) DNSSEC resolver
D) RRSIG record
A) security-aware resolver
B) trust anchor
C) DNSSEC resolver
D) RRSIG record
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
The objective of a phishing attack is to entice e-mail recipients to click a bogus link where personal information can be stolen.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is NOT a step you should take to prevent attackers from exploiting SQL security holes?
A) limit table access
B) use stored procedures
C) use standard naming conventions
D) place the database server in a DMZ
A) limit table access
B) use stored procedures
C) use standard naming conventions
D) place the database server in a DMZ
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
The term Internet and World Wide Web are different terms that mean the same thing.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is NOT a recommended security setting for Apache Web servers?
A) harden the underlying OS
B) create Web groups
C) use the default standard Web page error messages
D) disable HTTP traces
A) harden the underlying OS
B) create Web groups
C) use the default standard Web page error messages
D) disable HTTP traces
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Windows Basic Authentication requires that users enter a username and password and the password is transmitted using a hashing algorithm.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is true about the Internet?
A) it is the same as the World Wide Web
B) it was established in the mid-1960s
C) it was developed by a network of banks and businesses
D) it was originally built on an extended star topology
A) it is the same as the World Wide Web
B) it was established in the mid-1960s
C) it was developed by a network of banks and businesses
D) it was originally built on an extended star topology
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
What type of attack involves plaintext scripting that affects databases?
A) phishing
B) ActiveX control
C) Java applet
D) SQL injection
A) phishing
B) ActiveX control
C) Java applet
D) SQL injection
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
What type of attack exploits a lack of bounds checking on the size of data stored in an array?
A) buffer overflow
B) SQL injection
C) phishing
D) ActiveX control
A) buffer overflow
B) SQL injection
C) phishing
D) ActiveX control
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
What makes IP spoofing possible for computers on the Internet?
A) network address translation
B) the lack of authentication
C) the 32-bit address space
D) the DNS hierarchy
A) network address translation
B) the lack of authentication
C) the 32-bit address space
D) the DNS hierarchy
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
What type of DNS server is authoritative for a specific domain?
A) primary
B) secondary
C) read-only
D) initial
A) primary
B) secondary
C) read-only
D) initial
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is a highly secure public facility in which backbones have interconnected data lines and routers that exchange routing and traffic data?
A) ISP
B) POP
C) NAP
D) NSF
A) ISP
B) POP
C) NAP
D) NSF
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Which aspect of hardening a Windows Web server allows you to restrict access to the web server based on IP address?
A) authentication
B) NTFS permissions
C) access control
D) data confidentiality
A) authentication
B) NTFS permissions
C) access control
D) data confidentiality
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
What type of DNS configuration prevents internal zone information from being stored on an Internet-accessible server?
A) read-only zone
B) anti-phishing DNS
C) caching DNS zone
D) split-DNS architecture
A) read-only zone
B) anti-phishing DNS
C) caching DNS zone
D) split-DNS architecture
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
What is a zone transfer?
A) the movement of e-mail from one domain to another
B) updating a secondary DNS server
C) backing up an SQL data file
D) copying host file data to another system
A) the movement of e-mail from one domain to another
B) updating a secondary DNS server
C) backing up an SQL data file
D) copying host file data to another system
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Computers on the Internet are identified primarily by their IP address.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
SQL injection attacks are isolated to custom applications,so administrators can prevent them.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
MATCHING
a.anycast addressing
b.DNSSEC
c.network access points
d.pharming
e.POP ISPs
f.security-aware resolver
g.spear phishing
h.slit DNS architecture
i.split brain DNS architecture
j.zone transfer
a variation of phishing directed at specific users instead of using spam e-mail.
a.anycast addressing
b.DNSSEC
c.network access points
d.pharming
e.POP ISPs
f.security-aware resolver
g.spear phishing
h.slit DNS architecture
i.split brain DNS architecture
j.zone transfer
a variation of phishing directed at specific users instead of using spam e-mail.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
___________ direct network traffic to its destination on the Internet using tables and protocols.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
A critical buffer component is the function _________ and buffer overflows are usually aimed at this component.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
MATCHING
a.anycast addressing
b.DNSSEC
c.network access points
d.pharming
e.POP ISPs
f.security-aware resolver
g.spear phishing
h.slit DNS architecture
i.split brain DNS architecture
j.zone transfer
a network architecture that divides DNS services between two servers
a.anycast addressing
b.DNSSEC
c.network access points
d.pharming
e.POP ISPs
f.security-aware resolver
g.spear phishing
h.slit DNS architecture
i.split brain DNS architecture
j.zone transfer
a network architecture that divides DNS services between two servers
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
MATCHING
a.anycast addressing
b.DNSSEC
c.network access points
d.pharming
e.POP ISPs
f.security-aware resolver
g.spear phishing
h.slit DNS architecture
i.split brain DNS architecture
j.zone transfer
a network architecture that uses a single DNS domain with a DNS server on the organization's DMZ for Internet services and a DNS server on the internal network for service to internal hosts
a.anycast addressing
b.DNSSEC
c.network access points
d.pharming
e.POP ISPs
f.security-aware resolver
g.spear phishing
h.slit DNS architecture
i.split brain DNS architecture
j.zone transfer
a network architecture that uses a single DNS domain with a DNS server on the organization's DMZ for Internet services and a DNS server on the internal network for service to internal hosts
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
MATCHING
a.anycast addressing
b.DNSSEC
c.network access points
d.pharming
e.POP ISPs
f.security-aware resolver
g.spear phishing
h.slit DNS architecture
i.split brain DNS architecture
j.zone transfer
ISP facilities that provide connectivity to the Internet for business,education,and home users
a.anycast addressing
b.DNSSEC
c.network access points
d.pharming
e.POP ISPs
f.security-aware resolver
g.spear phishing
h.slit DNS architecture
i.split brain DNS architecture
j.zone transfer
ISP facilities that provide connectivity to the Internet for business,education,and home users
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
The _______________ Web Server is the most widely used Web server application.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
A _______________ applet is a small program sometimes used as embedded code in Web pages.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
MATCHING
a.anycast addressing
b.DNSSEC
c.network access points
d.pharming
e.POP ISPs
f.security-aware resolver
g.spear phishing
h.slit DNS architecture
i.split brain DNS architecture
j.zone transfer
a variation of phishing that intercepts traffic to a legitimate Web site and redirects it to a phony replica site
a.anycast addressing
b.DNSSEC
c.network access points
d.pharming
e.POP ISPs
f.security-aware resolver
g.spear phishing
h.slit DNS architecture
i.split brain DNS architecture
j.zone transfer
a variation of phishing that intercepts traffic to a legitimate Web site and redirects it to a phony replica site
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
The Internet tier system starts with a backbone network connected via _____________________ to regional Internet service providers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
MATCHING
a.anycast addressing
b.DNSSEC
c.network access points
d.pharming
e.POP ISPs
f.security-aware resolver
g.spear phishing
h.slit DNS architecture
i.split brain DNS architecture
j.zone transfer
highly secure public facilities where commercial Internet backbones and ISPs exchange routing and traffic data
a.anycast addressing
b.DNSSEC
c.network access points
d.pharming
e.POP ISPs
f.security-aware resolver
g.spear phishing
h.slit DNS architecture
i.split brain DNS architecture
j.zone transfer
highly secure public facilities where commercial Internet backbones and ISPs exchange routing and traffic data
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
MATCHING
a.anycast addressing
b.DNSSEC
c.network access points
d.pharming
e.POP ISPs
f.security-aware resolver
g.spear phishing
h.slit DNS architecture
i.split brain DNS architecture
j.zone transfer
a computing system that is compliant with DNSSEC and that attempts to resolve a fully qualified domain name to an IP address
a.anycast addressing
b.DNSSEC
c.network access points
d.pharming
e.POP ISPs
f.security-aware resolver
g.spear phishing
h.slit DNS architecture
i.split brain DNS architecture
j.zone transfer
a computing system that is compliant with DNSSEC and that attempts to resolve a fully qualified domain name to an IP address
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
MATCHING
a.anycast addressing
b.DNSSEC
c.network access points
d.pharming
e.POP ISPs
f.security-aware resolver
g.spear phishing
h.slit DNS architecture
i.split brain DNS architecture
j.zone transfer
a protocol designed to improve DNS security by using cryptography to ensure DNS integrity and authentication
a.anycast addressing
b.DNSSEC
c.network access points
d.pharming
e.POP ISPs
f.security-aware resolver
g.spear phishing
h.slit DNS architecture
i.split brain DNS architecture
j.zone transfer
a protocol designed to improve DNS security by using cryptography to ensure DNS integrity and authentication
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
____________ are networks of zombie computers that magnify the scope and intensity of an attack.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
_______________________ is a name-resolution service that translates domain names to IP addresses.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
MATCHING
a.anycast addressing
b.DNSSEC
c.network access points
d.pharming
e.POP ISPs
f.security-aware resolver
g.spear phishing
h.slit DNS architecture
i.split brain DNS architecture
j.zone transfer
a network addressing scheme that allows DNS services to be decentralized among a group of servers,regardless of their location
a.anycast addressing
b.DNSSEC
c.network access points
d.pharming
e.POP ISPs
f.security-aware resolver
g.spear phishing
h.slit DNS architecture
i.split brain DNS architecture
j.zone transfer
a network addressing scheme that allows DNS services to be decentralized among a group of servers,regardless of their location
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
The lack of authentication for computers on the Internet make IP _____________ possible,which is a change in the IP addresses in the headers of malicious packets.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
DNS _____________ poisoning steers unsuspecting victims to a server of the attacker's choice instead of the intended Web site.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
The goal of _____________ is to provide authentication of DNS data and ensure integrity of DNS data.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
MATCHING
a.anycast addressing
b.DNSSEC
c.network access points
d.pharming
e.POP ISPs
f.security-aware resolver
g.spear phishing
h.slit DNS architecture
i.split brain DNS architecture
j.zone transfer
the communication of a zone file from the primary DNS server to secondary DNS servers for updating
a.anycast addressing
b.DNSSEC
c.network access points
d.pharming
e.POP ISPs
f.security-aware resolver
g.spear phishing
h.slit DNS architecture
i.split brain DNS architecture
j.zone transfer
the communication of a zone file from the primary DNS server to secondary DNS servers for updating
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What is the origin and structure of the Internet? Include some of the services it provides and the protocols they use.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What is a buffer overflow attack?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
What are the four guidelines for employees to follow to prevent phishing attacks?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
How can you provide data confidentiality for your IIS Web server?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
How can you harden a DNS server using the split DNS architecture?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
List three of the steps you should take to close potential holes against SQL injection attacks.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
What routing protocol is usually used on the Internet? Why is the information used by the protocol vulnerable to compromise?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
What are the characteristics of a corporate phishing e-mail? List three of them.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
What is the Internet backbone? Describe how routers work with the Internet backbone.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
What is the DNS hierarchical system? Include a discussion of root servers in your answer.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck