Guide to Network Security

Computing

Quiz 8 :

Security of Web Applications

Quiz 8 :

Security of Web Applications

Question Type
search
arrow
What is the best way to secure FTP or TFTP?
Free
Multiple Choice
Answer:

Answer:

D

Tags
Choose question tag
close menu
arrow
____ is a simple method of transferring files between computer systems.
Free
Multiple Choice
Answer:

Answer:

B

Tags
Choose question tag
close menu
arrow
In passive mode, the FTP client must listen and wait for the server connection.
Free
True False
Answer:

Answer:

False

Tags
Choose question tag
close menu
arrow
With ____ mode, a trusted internal FTP client makes an outgoing request to the FTP server.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
A(n) ____ is designed to translate information sent from a particular agent or class of agents.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
One of the biggest strengths of Perl is its ____-manipulation abilities.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
____ is the basis for Web communication.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
When properly configured to afford anonymous users only very limited access, the FTP server works well.
True False
Answer:
Tags
Choose question tag
close menu
arrow
____ is a key component of the Web, working in conjunction with HTTP to move content from servers to clients.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
The Common Gateway Interface (CGI) is a programming language in and of itself.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Which HTTP response code indicates that an error has occurred on the client side?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
____ are collections of IP addresses of known spam sources on the Internet, and they can be easily integrated into most SMTP server configurations.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
What is the best way to secure Telnet?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
DNS ____ provide a mechanism to divide ownership responsibility among various DNS servers and the organizations they serve.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which HTTP request method retrieves meta-information only from the resource signified in the URI?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
A sender with a valid internal IP address should be allowed to send e-mail to external e-mail addresses.
True False
Answer:
Tags
Choose question tag
close menu
arrow
To provide monitoring, an SNMP ____ must be installed on a desired host or network device.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Most of the weaknesses with SNMP occur with Version 1 of SNMP.
True False
Answer:
Tags
Choose question tag
close menu
arrow
An SMTP ____ is a simple message providing status information about the monitored device.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
A major problem with FTP is that data is transferred in ____.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
Showing 1 - 20 of 50