Chapter 12 – Internet and World Wide Web Security

Unlock all answers in this set

Unlock answers
question
Which of the following is a highly secure public facility in which backbones have interconnected data lines and routers that exchange routing and traffic data?
answer
NAP
question
What makes IP spoofing possible for computers on the Internet?
answer
the lack of authentication
question
What type of attack exploits a lack of bounds checking on the size of data stored in an array?
answer
buffer overflow
question
What type of attack involves plaintext scripting that affects database?
answer
SQL injection
question
What type of attack displays false information masquerading as legitimate data?
answer
Phishing
question
Which variation on phishing modifies the user's host file to redirect traffic?
answer
Pharming
question
What is a zone transfer?
answer
updating a secondary DNS server
question
What type of DNS configuration prevents internal zone information from being stored on an Internet- accessible server?
answer
split-DNS architecture
question
Which of the following is a top-level digital certificate in the PKI chain?
answer
Trust anchor
question
Which aspect of hardening a Windows Web server allows you to resist access to the web server based on IP address?
answer
access control
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New