Page 368 - StudyBook.pdf
P. 368
352 Chapter 5 • Communication Security: Web Based Services
A. Disable script source access
B. Set execute permissions in the directory to “None”
C. Disable directory browsing
D. Enable log visits
5. A user contacts you with concerns over cookies found on their hard disk.The
user visited a banking site several months ago, and when filling out a form on
the site, provided some personal information that was saved to a cookie. Even
though this was months ago, when the user returned to the site, it displayed
his name and other information on the Web page.This led the user to check
his computer, and find that the cookie created months ago is still on the hard
disk of his computer.What type of cookie is this?
A. Temporary
B. Session
C. Persistent
D. Tracking
6. When reviewing security on an intranet, an administrator finds that the Web
server is using port 22.The administrator wants transmission of data on the
intranet to be secure.Which of the following is true about the data being
transmitted using this port?
A. TFTP is being used, so transmission of data is secure.
B. TFTP is being used, so transmission of data is insecure.
C. FTP is being used, so transmission of data is secure.
D. S/FTP is being used, so transmission of data is secure.
7. A number of scans are being performed on computers on the network.When
determining which computer is running the scans on these machines, you
find that the source of the scans are the FTP server.What type of attack is
occurring?
A. Bounce attack
B. Phishing
C. DoS
D. Web site spoofing
www.syngress.com