ISEC 322: Design & Analysis of Sec Protocols - Quiz

UserReplaceableGradient avatar
UserReplaceableGradient
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

What is a common vulnerability associated with ARP?

Eavesdropping

Which type of attack is associated with the TCP protocol?

SYN flood attack

What type of security issue is commonly associated with SMTP?

Man-in-the-middle attack

What is a known vulnerability associated with DNS?

<p>DNS spoofing</p> Signup and view all the answers

Which security problem is often related to Web forms, cookies, and CGI scripts?

<p>Cross-site scripting</p> Signup and view all the answers

What type of misuse is associated with mobile code like Java scripts and ActiveX controls?

<p>Denial of Service (DoS)</p> Signup and view all the answers

What is a potential risk associated with using helper applications in browsers?

<p>Downloading dangerous content that may contain macro viruses</p> Signup and view all the answers

How can DNS spoofing impact web security?

<p>Downgrading browser security by reducing the key length in SSL connections</p> Signup and view all the answers

What is the primary concern with mobile code like ActiveX controls in terms of security?

<p>They run directly on the machine without a sandbox</p> Signup and view all the answers

Which statement accurately describes Java applets in terms of running environment?

<p>Java applets run within a controlled environment called a sandbox</p> Signup and view all the answers

What is a known danger associated with signed ActiveX controls?

<p>Writing arbitrary files on the hard disk leading to potential exploitation</p> Signup and view all the answers

How do JavaScript applet scripts differ from Java applets in terms of processing within browsers?

<p>JavaScript applet scripts are interpreted by the browser itself, not as powerful as Java applets</p> Signup and view all the answers

What is a potential risk associated with sending cookies in clear?

<p>Eavesdropping and potential session hijacking</p> Signup and view all the answers

How can third-party advertisements pose a privacy risk to users?

<p>By setting a cookie that can track user visits</p> Signup and view all the answers

What is a common consequence of unexpected user input in web forms?

<p>Security vulnerabilities</p> Signup and view all the answers

In the context of password-based user authentication, what issue can arise from inadequate input validation?

<p>SQL injection attacks</p> Signup and view all the answers

What type of attack exploits the program's failure to verify data sizes, potentially leading to memory corruption?

<p>Buffer overflow attacks</p> Signup and view all the answers

How can cross-site scripting (XSS) be characterized?

<p>Sending malicious scripts to trusted servers</p> Signup and view all the answers

Which type of attack involves the attacker arranging for the victim to receive a malicious script from a trusted server?

<p>^ARP poisoning</p> Signup and view all the answers

What could be a consequence of buffer overflow attacks if left unmitigated?

<p>Potential memory corruption and control by attackers</p> Signup and view all the answers

What is the main risk associated with inadequate input validation in server-side scripts?

<p>Potential SQL injection vulnerabilities</p> Signup and view all the answers

How can setting cookies by web servers pose security risks?

<p>Exposing sensitive session information to potential attackers</p> Signup and view all the answers

More Quizzes Like This

Internet Security and Privacy
5 questions
Internet Security Risks Quiz
10 questions
E-Business Security Principles
10 questions
Final
20 questions

Final

StrongestPascal avatar
StrongestPascal
Use Quizgecko on...
Browser
Browser