Questions and Answers
What is a common vulnerability associated with ARP?
Eavesdropping
Which type of attack is associated with the TCP protocol?
SYN flood attack
What type of security issue is commonly associated with SMTP?
Man-in-the-middle attack
What is a known vulnerability associated with DNS?
Signup and view all the answers
Which security problem is often related to Web forms, cookies, and CGI scripts?
Signup and view all the answers
What type of misuse is associated with mobile code like Java scripts and ActiveX controls?
Signup and view all the answers
What is a potential risk associated with using helper applications in browsers?
Signup and view all the answers
How can DNS spoofing impact web security?
Signup and view all the answers
What is the primary concern with mobile code like ActiveX controls in terms of security?
Signup and view all the answers
Which statement accurately describes Java applets in terms of running environment?
Signup and view all the answers
What is a known danger associated with signed ActiveX controls?
Signup and view all the answers
How do JavaScript applet scripts differ from Java applets in terms of processing within browsers?
Signup and view all the answers
What is a potential risk associated with sending cookies in clear?
Signup and view all the answers
How can third-party advertisements pose a privacy risk to users?
Signup and view all the answers
What is a common consequence of unexpected user input in web forms?
Signup and view all the answers
In the context of password-based user authentication, what issue can arise from inadequate input validation?
Signup and view all the answers
What type of attack exploits the program's failure to verify data sizes, potentially leading to memory corruption?
Signup and view all the answers
How can cross-site scripting (XSS) be characterized?
Signup and view all the answers
Which type of attack involves the attacker arranging for the victim to receive a malicious script from a trusted server?
Signup and view all the answers
What could be a consequence of buffer overflow attacks if left unmitigated?
Signup and view all the answers
What is the main risk associated with inadequate input validation in server-side scripts?
Signup and view all the answers
How can setting cookies by web servers pose security risks?
Signup and view all the answers