ISEC 322: Design & Analysis of Sec Protocols - Quiz
22 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a common vulnerability associated with ARP?

  • SQL injection
  • Eavesdropping (correct)
  • Cookie theft
  • Cross-site scripting

Which type of attack is associated with the TCP protocol?

  • Cross-site request forgery
  • Brute force attack
  • SYN flood attack (correct)
  • Clickjacking

What type of security issue is commonly associated with SMTP?

  • SQL injection
  • Eavesdropping
  • Man-in-the-middle attack (correct)
  • Cross-site scripting

What is a known vulnerability associated with DNS?

<p>DNS spoofing (C)</p> Signup and view all the answers

Which security problem is often related to Web forms, cookies, and CGI scripts?

<p>Cross-site scripting (D)</p> Signup and view all the answers

What type of misuse is associated with mobile code like Java scripts and ActiveX controls?

<p>Denial of Service (DoS) (A)</p> Signup and view all the answers

What is a potential risk associated with using helper applications in browsers?

<p>Downloading dangerous content that may contain macro viruses (C)</p> Signup and view all the answers

How can DNS spoofing impact web security?

<p>Downgrading browser security by reducing the key length in SSL connections (A)</p> Signup and view all the answers

What is the primary concern with mobile code like ActiveX controls in terms of security?

<p>They run directly on the machine without a sandbox (A)</p> Signup and view all the answers

Which statement accurately describes Java applets in terms of running environment?

<p>Java applets run within a controlled environment called a sandbox (B)</p> Signup and view all the answers

What is a known danger associated with signed ActiveX controls?

<p>Writing arbitrary files on the hard disk leading to potential exploitation (B)</p> Signup and view all the answers

How do JavaScript applet scripts differ from Java applets in terms of processing within browsers?

<p>JavaScript applet scripts are interpreted by the browser itself, not as powerful as Java applets (D)</p> Signup and view all the answers

What is a potential risk associated with sending cookies in clear?

<p>Eavesdropping and potential session hijacking (D)</p> Signup and view all the answers

How can third-party advertisements pose a privacy risk to users?

<p>By setting a cookie that can track user visits (D)</p> Signup and view all the answers

What is a common consequence of unexpected user input in web forms?

<p>Security vulnerabilities (C)</p> Signup and view all the answers

In the context of password-based user authentication, what issue can arise from inadequate input validation?

<p>SQL injection attacks (B)</p> Signup and view all the answers

What type of attack exploits the program's failure to verify data sizes, potentially leading to memory corruption?

<p>Buffer overflow attacks (C)</p> Signup and view all the answers

How can cross-site scripting (XSS) be characterized?

<p>Sending malicious scripts to trusted servers (B)</p> Signup and view all the answers

Which type of attack involves the attacker arranging for the victim to receive a malicious script from a trusted server?

<p>^ARP poisoning (A)</p> Signup and view all the answers

What could be a consequence of buffer overflow attacks if left unmitigated?

<p>Potential memory corruption and control by attackers (D)</p> Signup and view all the answers

What is the main risk associated with inadequate input validation in server-side scripts?

<p>Potential SQL injection vulnerabilities (B)</p> Signup and view all the answers

How can setting cookies by web servers pose security risks?

<p>Exposing sensitive session information to potential attackers (A)</p> Signup and view all the answers

More Like This

E-Business Security Principles
10 questions
Understanding Internet Security
12 questions
e-Business and e-Commerce Concepts
26 questions
Use Quizgecko on...
Browser
Browser