- A browser helper object (BHO) has unrestricted access to the Internet Explorer event model and can perform tasks such as capturing keystrokes. True
- A signed applet can be hijacked. True
- A(n) __________ outlines the proper settings and configurations for an application or set of applications. application configuration baseline
- Buffer overflow is one of the most common web attack methodologies. False
- Certificates vouch for code security. False
- Certificates vouch for code security. False
- Compilers create runtime code that can be executed via an interpreter engine, like a Java virtual machine (JVM), on a computer system. False
- FTP encrypts traffic by default. False
- FTP encrypts traffic by default. False
- In the case of an FTP server, which account allows unlimited public access to the files and is commonly used when you want to have unlimited distribution? Anonymous
- In which phase of the secure development lifecycle model would you employ use cases? Testing phase
- JavaScript is part of the Java environment False
- JavaScript is part of the Java environment. False
- Least privilege refers to removing all controls from a system. False
- Server-side scripts are executable programs that are either interpreted or that run in virtual machines. True
- The generation of a real random number is a trivial task. False
- The spiral model is an iterative model designed to enable the construction of increasingly complex versions of a project. False
- TLS is dead and SSL is the path forward. False
- What application is associated with TCP Ports 989 and 990? FTPS
- What application is associated with TCP Ports 989 and 990? FTPS
- What does the term spiral method refer to? A software engineering process category
- What is the goal of TCP? To send an unauthenticated, error-free stream of information between two computers.
- When using Secure FTP (SFTP) for confidential transfer, what protocol is combined with FTP to accomplish this task? Secure Shell (SSH)
- When using Secure FTP (SFTP) for confidential transfer, what protocol is combined with FTP to accomplish this task? Secure Shell (SSH)
- Which attack is a code injection attack in which an attacker sends code in response to an input request? Cross-site scripting attack
- Which attack is a code injection attack in which an attacker sends code in response to an input request? Cross-site scripting attack
- Which attack is the most common exploit used to hack into software? Buffer overflow
- Which attack works on both SSL and TLS by transparently converting the secure HTTPS connection into a plain HTTP connection, removing the transport layer encryption protections? SSL stripping attack
- Which browser plug-in allows the user to determine which domains have trusted scripts? NoScript
- Which cryptographic protocols can be used by SSL/TLS? Diffie-Hellman and RSA
- Which phase of the secure development lifecycle model is concerned with minimizing the attack surface area? Design phase
- Which plug-in helps a browser maintain an HTTPS connection and gives a warning when it is not present? HTTPS Everywhere
- Which plug-in helps a browser maintain an HTTPS connection and gives a warning when it is not present? HTTPS Everywhere
- Which port does HTTP traffic travel over by default? TCP port 80
- Which port is used by SSMTP? TCP port 465
- Which port is used by SSMTP? TCP port 465
- Which protocol is designed to operate both ways, sending and receiving, and can enable remote file operations over a TCP IP connection? FTP
- Which protocol is used for the transfer of hyperlinked data over the Internet, from web servers to browsers? HTTP
- Which statement describes the primary purpose of JavaScript? The primary purpose of JavaScript is to enable features such as validation of forms before they are submitted to the server.
- Which term describes a collection of technologies that is designed to make Web sites more useful for users? Web 2.0
- Which term describes a piece of code that is distributed to allow additional functionality to be added to an existing program? Add-on
- Which term describes a piece of code that is distributed to allow additional functionality to be added to an existing program? Add-on
- Which term is a means of signing an ActiveX control so that a user can judge trust based on the control’s creator? Authenticode
- Which term refers to the process by which application programs manipulate strings to a base form, creating a foundational representation of the input? Canonicalization
- Which term refers to the process of checking whether the program specification captures the requirements from the customer? Validation
- Which type of attack can be used to execute arbitrary commands in a database? SQL injection
- Which type of testing involves running the system under a controlled speed environment? Load testing
Other Links:
See other websites for quiz:
Check on QUIZLET