Ask a new question
Sign up
Login
Home
Discover Topics
Referral Program
Loans
Flashcards
Upload
Contact us
Topics
Topic
Computing
Study-set
Guide to Network Security
Prev
Quiz
Next
Quiz
Guide to Network Security
Computing
Quiz 8 :
Security of Web Applications
Study Flashcards
Looking for
Networking & Security Homework Help?
Unlock Package
Study Flashcards
Unlock Package
Quiz 8 :
Security of Web Applications
Prev
Quiz
Next
Quiz
Question Type
All
What is the best way to secure FTP or TFTP?
Free
Multiple Choice
Q01
Answer:
Answer:
D
Tags
Add
Choose question tag
Discard
Apply
____ is a simple method of transferring files between computer systems.
Free
Multiple Choice
Q02
Answer:
Answer:
B
Tags
Add
Choose question tag
Discard
Apply
In passive mode, the FTP client must listen and wait for the server connection.
Free
True False
Q03
Answer:
Answer:
False
Tags
Add
Choose question tag
Discard
Apply
With ____ mode, a trusted internal FTP client makes an outgoing request to the FTP server.
Multiple Choice
Q04
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
A(n) ____ is designed to translate information sent from a particular agent or class of agents.
Multiple Choice
Q05
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
One of the biggest strengths of Perl is its ____-manipulation abilities.
Multiple Choice
Q06
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
____ is the basis for Web communication.
Multiple Choice
Q07
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
When properly configured to afford anonymous users only very limited access, the FTP server works well.
True False
Q08
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
____ is a key component of the Web, working in conjunction with HTTP to move content from servers to clients.
Multiple Choice
Q09
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
The Common Gateway Interface (CGI) is a programming language in and of itself.
True False
Q10
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
Which HTTP response code indicates that an error has occurred on the client side?
Multiple Choice
Q11
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
____ are collections of IP addresses of known spam sources on the Internet, and they can be easily integrated into most SMTP server configurations.
Multiple Choice
Q12
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
What is the best way to secure Telnet?
Multiple Choice
Q13
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
DNS ____ provide a mechanism to divide ownership responsibility among various DNS servers and the organizations they serve.
Multiple Choice
Q14
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
Which HTTP request method retrieves meta-information only from the resource signified in the URI?
Multiple Choice
Q15
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
A sender with a valid internal IP address should be allowed to send e-mail to external e-mail addresses.
True False
Q16
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
To provide monitoring, an SNMP ____ must be installed on a desired host or network device.
Multiple Choice
Q17
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
Most of the weaknesses with SNMP occur with Version 1 of SNMP.
True False
Q18
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
An SMTP ____ is a simple message providing status information about the monitored device.
Multiple Choice
Q19
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
A major problem with FTP is that data is transferred in ____.
Multiple Choice
Q20
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
Showing 1 - 20 of 50
Prev
1
...
2
...
3
...
Next