Page 368 - StudyBook.pdf
P. 368

352    Chapter 5 • Communication Security: Web Based Services

                  A. Disable script source access

                  B. Set execute permissions in the directory to “None”
                  C. Disable directory browsing
                  D. Enable log visits


              5. A user contacts you with concerns over cookies found on their hard disk.The
                  user visited a banking site several months ago, and when filling out a form on
                  the site, provided some personal information that was saved to a cookie. Even
                  though this was months ago, when the user returned to the site, it displayed
                  his name and other information on the Web page.This led the user to check
                  his computer, and find that the cookie created months ago is still on the hard
                  disk of his computer.What type of cookie is this?

                  A. Temporary
                  B. Session
                  C. Persistent

                  D. Tracking

              6. When reviewing security on an intranet, an administrator finds that the Web
                  server is using port 22.The administrator wants transmission of data on the
                  intranet to be secure.Which of the following is true about the data being
                  transmitted using this port?

                  A. TFTP is being used, so transmission of data is secure.
                  B. TFTP is being used, so transmission of data is insecure.
                  C. FTP is being used, so transmission of data is secure.

                  D. S/FTP is being used, so transmission of data is secure.

              7. A number of scans are being performed on computers on the network.When
                  determining which computer is running the scans on these machines, you
                  find that the source of the scans are the FTP server.What type of attack is
                  occurring?

                  A. Bounce attack
                  B. Phishing
                  C. DoS

                  D. Web site spoofing



          www.syngress.com
   363   364   365   366   367   368   369   370   371   372   373