ISEC 322: Design & Analysis of Sec Protocols - Quiz
22 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a common vulnerability associated with ARP?

  • SQL injection
  • Eavesdropping (correct)
  • Cookie theft
  • Cross-site scripting
  • Which type of attack is associated with the TCP protocol?

  • Cross-site request forgery
  • Brute force attack
  • SYN flood attack (correct)
  • Clickjacking
  • What type of security issue is commonly associated with SMTP?

  • SQL injection
  • Eavesdropping
  • Man-in-the-middle attack (correct)
  • Cross-site scripting
  • What is a known vulnerability associated with DNS?

    <p>DNS spoofing</p> Signup and view all the answers

    Which security problem is often related to Web forms, cookies, and CGI scripts?

    <p>Cross-site scripting</p> Signup and view all the answers

    What type of misuse is associated with mobile code like Java scripts and ActiveX controls?

    <p>Denial of Service (DoS)</p> Signup and view all the answers

    What is a potential risk associated with using helper applications in browsers?

    <p>Downloading dangerous content that may contain macro viruses</p> Signup and view all the answers

    How can DNS spoofing impact web security?

    <p>Downgrading browser security by reducing the key length in SSL connections</p> Signup and view all the answers

    What is the primary concern with mobile code like ActiveX controls in terms of security?

    <p>They run directly on the machine without a sandbox</p> Signup and view all the answers

    Which statement accurately describes Java applets in terms of running environment?

    <p>Java applets run within a controlled environment called a sandbox</p> Signup and view all the answers

    What is a known danger associated with signed ActiveX controls?

    <p>Writing arbitrary files on the hard disk leading to potential exploitation</p> Signup and view all the answers

    How do JavaScript applet scripts differ from Java applets in terms of processing within browsers?

    <p>JavaScript applet scripts are interpreted by the browser itself, not as powerful as Java applets</p> Signup and view all the answers

    What is a potential risk associated with sending cookies in clear?

    <p>Eavesdropping and potential session hijacking</p> Signup and view all the answers

    How can third-party advertisements pose a privacy risk to users?

    <p>By setting a cookie that can track user visits</p> Signup and view all the answers

    What is a common consequence of unexpected user input in web forms?

    <p>Security vulnerabilities</p> Signup and view all the answers

    In the context of password-based user authentication, what issue can arise from inadequate input validation?

    <p>SQL injection attacks</p> Signup and view all the answers

    What type of attack exploits the program's failure to verify data sizes, potentially leading to memory corruption?

    <p>Buffer overflow attacks</p> Signup and view all the answers

    How can cross-site scripting (XSS) be characterized?

    <p>Sending malicious scripts to trusted servers</p> Signup and view all the answers

    Which type of attack involves the attacker arranging for the victim to receive a malicious script from a trusted server?

    <p>^ARP poisoning</p> Signup and view all the answers

    What could be a consequence of buffer overflow attacks if left unmitigated?

    <p>Potential memory corruption and control by attackers</p> Signup and view all the answers

    What is the main risk associated with inadequate input validation in server-side scripts?

    <p>Potential SQL injection vulnerabilities</p> Signup and view all the answers

    How can setting cookies by web servers pose security risks?

    <p>Exposing sensitive session information to potential attackers</p> Signup and view all the answers

    More Like This

    E-Business Security Principles
    10 questions
    Understanding Internet Security
    12 questions
    e-Business and e-Commerce Concepts
    26 questions
    Use Quizgecko on...
    Browser
    Browser