eBook _ Chapter 4 Mitigating Risk When Connecting to the Internet

pdf

School

Baltimore City Community College *

*We aren’t endorsed by this school

Course

104

Subject

Information Systems

Date

Feb 20, 2024

Type

pdf

Pages

2

Uploaded by Ophil

Report
Internet Security: How to Defend Against Attackers on the Web, Second Edition ISBN 9781284169973 PART TWO Secure Web-Enabled Application Deployment and Social Networking Chapter 4 Mitigating Risk When Connecting to the Internet CHAPTER 4 ASSESSMENT 1. Worms are able to self-replicate. A. True B. False 2. You have created a Web site and need to increase visitor trust. Which of the following methods are used to build trust? (Select two.) A. Logos B. Testimonials C. Color choice D. Font size 3. IDS and IPS systems are a replacement for a firewall system. A. True B. False 4. Which of the following attack types is based on faking the real source of a transmission, file, or e-mail? A. Backdoor B. DDoS C. Spoofing D. Front door 5. To increase network security, you have decided to block port 21. Which of the following services is associated with port 21? A. FTP B. HTTPS C. DNS D. SFTP 6. A(n) _______ is a passive network monitoring and security system. 7. Servers within the DMZ sit outside of the local network. A. True B. False 8. Port _______ is used by the HTTP protocol. 109
9. A _______ sits between the Internet and the client systems responding to client requests for Web pages. 10. Which of the following best describes the function of the DNS server? A. Uses Media Access Control addresses to locate network systems B. Provides host name-to-IP resolution C. Provides IP name resolution D. Encrypts host names 11. A DoS attack is designed to overwhelm a particular resource making it unavailable. A. True B. False
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help