Internet Security: How to Defend Against Attackers on the Web, Second Edition
ISBN 9781284169973
PART TWO Secure Web-Enabled Application Deployment and Social Networking
Chapter 4 Mitigating Risk When Connecting to the Internet
CHAPTER 4 ASSESSMENT
1.
Worms are able to self-replicate.
A. True
B. False
2.
You have created a Web site and need to increase visitor trust. Which of the following
methods are used to build trust? (Select two.)
A. Logos
B. Testimonials
C. Color choice
D. Font size
3.
IDS and IPS systems are a replacement for a firewall system.
A. True
B. False
4.
Which of the following attack types is based on faking the real source of a transmission,
file, or e-mail?
A. Backdoor
B. DDoS
C. Spoofing
D. Front door
5.
To increase network security, you have decided to block port 21. Which of the following
services is associated with port 21?
A. FTP
B. HTTPS
C. DNS
D. SFTP
6.
A(n) _______ is a passive network monitoring and security system.
7.
Servers within the DMZ sit outside of the local network.
A. True
B. False
8.
Port _______ is used by the HTTP protocol.
109