Deck 13: Programming Exploits

ملء الشاشة (f)
exit full mode
سؤال
During the early days of the Internet, most Web pages were static HTML, so programming exploits could only be aimed at the client-side browsers.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The design flaw in ActiveX is that ActiveX can do anything the user can do.
سؤال
The COM architecture was first released with Windows XP.
سؤال
One of the least common exploits used on the Internet is a buffer overflow.
سؤال
HTML is a dynamic language, and can be executed successfully outside a Web browser.
سؤال
____ controls are stand-alone compiled applications designed to make it possible to link and allow interactions between variously developed applications.

A)ActiveX
B)Applets
C)Java widgets
D)VBScript
سؤال
Up until ____, when Microsoft issued the patch that disables autoplay of ActiveX controls, ActiveX was becoming a widespread way to perform surreptitious installation of spyware and adware on Windows machines.

A)2000
B)2001
C)2003
D)2006
سؤال
The ____ vulnerability exploits an unchecked buffer in Internet Explorer processing HTML elements such as FRAME and IFRAME elements.

A)phishing
B)buffer overflow
C)HTML e-mail
D)remote access
سؤال
Secure transfer of data has been made available by protocols such as ____.

A)FTP
B)HTTP
C)SSL
D)TCP
سؤال
SSL encrypts the session, as well as the data that is being used in the session, using ____.

A)PKI
B)VPN
C)TLS
D)HTTPS
سؤال
_________________________ are the defects in various programming languages that are used to develop server-side and client-side applications.
سؤال
____________________ controls are Component Object Model (COM) objects that can be embedded in a variety of applications.
سؤال
____________________, Microsoft's answer to Netscape's JavaScript language, is loosely based on the Visual Basic programming language, but is much simpler.
سؤال
______________________________ is the most basic script used to develop Web pages and uses a set of markup tags, such as , to define the structure of Web pages.
سؤال
Java is designed to run in a platform-independent manner using _________________________ installed on the client computer as its sandbox.
سؤال
What is the difference between a script and a programming language?
سؤال
How can attackers use ActiveX to modify resources on an implementation of Windows?
سؤال
What security measures regarding ActiveX should you take if you are running Windows 2000 or Windows XP?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/18
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 13: Programming Exploits
1
During the early days of the Internet, most Web pages were static HTML, so programming exploits could only be aimed at the client-side browsers.
True
2
The design flaw in ActiveX is that ActiveX can do anything the user can do.
True
3
The COM architecture was first released with Windows XP.
False
4
One of the least common exploits used on the Internet is a buffer overflow.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
5
HTML is a dynamic language, and can be executed successfully outside a Web browser.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
6
____ controls are stand-alone compiled applications designed to make it possible to link and allow interactions between variously developed applications.

A)ActiveX
B)Applets
C)Java widgets
D)VBScript
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
7
Up until ____, when Microsoft issued the patch that disables autoplay of ActiveX controls, ActiveX was becoming a widespread way to perform surreptitious installation of spyware and adware on Windows machines.

A)2000
B)2001
C)2003
D)2006
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
8
The ____ vulnerability exploits an unchecked buffer in Internet Explorer processing HTML elements such as FRAME and IFRAME elements.

A)phishing
B)buffer overflow
C)HTML e-mail
D)remote access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
9
Secure transfer of data has been made available by protocols such as ____.

A)FTP
B)HTTP
C)SSL
D)TCP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
10
SSL encrypts the session, as well as the data that is being used in the session, using ____.

A)PKI
B)VPN
C)TLS
D)HTTPS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
11
_________________________ are the defects in various programming languages that are used to develop server-side and client-side applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
12
____________________ controls are Component Object Model (COM) objects that can be embedded in a variety of applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
13
____________________, Microsoft's answer to Netscape's JavaScript language, is loosely based on the Visual Basic programming language, but is much simpler.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
14
______________________________ is the most basic script used to develop Web pages and uses a set of markup tags, such as , to define the structure of Web pages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
15
Java is designed to run in a platform-independent manner using _________________________ installed on the client computer as its sandbox.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
16
What is the difference between a script and a programming language?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
17
How can attackers use ActiveX to modify resources on an implementation of Windows?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
18
What security measures regarding ActiveX should you take if you are running Windows 2000 or Windows XP?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.