ISEC 322: Design & Analysis of Sec Protocols - Quiz

UserReplaceableGradient avatar

Start Quiz

Study Flashcards

22 Questions

What is a common vulnerability associated with ARP?


Which type of attack is associated with the TCP protocol?

SYN flood attack

What type of security issue is commonly associated with SMTP?

Man-in-the-middle attack

What is a known vulnerability associated with DNS?

DNS spoofing

Which security problem is often related to Web forms, cookies, and CGI scripts?

Cross-site scripting

What type of misuse is associated with mobile code like Java scripts and ActiveX controls?

Denial of Service (DoS)

What is a potential risk associated with using helper applications in browsers?

Downloading dangerous content that may contain macro viruses

How can DNS spoofing impact web security?

Downgrading browser security by reducing the key length in SSL connections

What is the primary concern with mobile code like ActiveX controls in terms of security?

They run directly on the machine without a sandbox

Which statement accurately describes Java applets in terms of running environment?

Java applets run within a controlled environment called a sandbox

What is a known danger associated with signed ActiveX controls?

Writing arbitrary files on the hard disk leading to potential exploitation

How do JavaScript applet scripts differ from Java applets in terms of processing within browsers?

JavaScript applet scripts are interpreted by the browser itself, not as powerful as Java applets

What is a potential risk associated with sending cookies in clear?

Eavesdropping and potential session hijacking

How can third-party advertisements pose a privacy risk to users?

By setting a cookie that can track user visits

What is a common consequence of unexpected user input in web forms?

Security vulnerabilities

In the context of password-based user authentication, what issue can arise from inadequate input validation?

SQL injection attacks

What type of attack exploits the program's failure to verify data sizes, potentially leading to memory corruption?

Buffer overflow attacks

How can cross-site scripting (XSS) be characterized?

Sending malicious scripts to trusted servers

Which type of attack involves the attacker arranging for the victim to receive a malicious script from a trusted server?

^ARP poisoning

What could be a consequence of buffer overflow attacks if left unmitigated?

Potential memory corruption and control by attackers

What is the main risk associated with inadequate input validation in server-side scripts?

Potential SQL injection vulnerabilities

How can setting cookies by web servers pose security risks?

Exposing sensitive session information to potential attackers

Test your knowledge on Internet and e-commerce security protocols, vulnerabilities, TCP/IP networking, and common protocol vulnerabilities. This quiz is based on the associated course learning outcomes and covers topics such as ARP spoofing, eavesdropping, SYN attacks, password sniffing, email forgery, and more.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Internet Security Risks Quiz
10 questions
Internet Security Essentials Quiz
5 questions
Internet Security Risks Assessment
10 questions

Internet Security Risks Assessment

EngagingWilliamsite1265 avatar
E-Business Security Principles
10 questions
Use Quizgecko on...