Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) language attacks
B) cross-site request attacks
C) hijacking attacks
D) injection attacks
Correct Answer
verified
Multiple Choice
A) MAC cache
B) Ethernet cache
C) ARP cache
D) NIC
Correct Answer
verified
Multiple Choice
A) spoofing
B) URL hijacking
C) Web squatting
D) typo hijacking
Correct Answer
verified
Multiple Choice
A) IP spoofing
B) denial of service
C) DNS Poisoning
D) smurf attack
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) In the URL.
B) In the trailer of a frame.
C) In the header of a packet.
D) In the header of the HTTP requisition.
Correct Answer
verified
Multiple Choice
A) extensions
B) add-ons
C) plug-ins
D) Java applets
Correct Answer
verified
Multiple Choice
A) cross-site input attacks
B) cross-site scripting attacks
C) cross-site request forgery attacks
D) cross-site flood attacks
Correct Answer
verified
Showing 41 - 50 of 50
Related Exams