Network Security Source 4
Network Security Source 4
State Finished
Completed on Saturday, 23 January 2021, 8:55 PM
Time taken 3 mins 52 secs
Marks 15.00/15.00
Grade 10.00 out of 10.00 (100%)
Question 1
Complete
Mark 1.00 out of 1.00
Flag question
Question text
very single application must go through the options and check whether each
application is configured in the most secure state.
Select one:
True
False
Question 2
Complete
Mark 1.00 out of 1.00
Flag question
Question text
It is another term for a runtime error
Exception
Answer:
Question 3
Complete
Mark 1.00 out of 1.00
Flag question
Question text
It can manipulate your system including the deletion of the important files on
your computer.
ActiveX controls
Answer:
Question 4
Complete
Mark 1.00 out of 1.00
Flag question
Question text
The following codes is an example of?
Try
MessageBox.Show(cdbl(txtTotalValue.text) + cdbl(txtTotalVAT.text))
Catch ex as InvalidCastException
MessageBox.Show("Please supply 2 numbers as input")
Catch ex as Exception
MessageBox.Show("An error has occurred. Please try again.")
End Try
Select one:
a.
handling errors
b.
try/catch block
c.
Exception handling
d.
block syntax
Feedback
Your answer is correct.
Question 5
Complete
Mark 1.00 out of 1.00
Flag question
Question text
These are logon information from all the websites you visit and is stored in
memory on computer
Cookies
Answer:
Question 6
Complete
Mark 1.00 out of 1.00
Flag question
Question text
It is a security concern because most scripting languages can make some
alteration to your system.
Select one:
a.
Scripting
b.
Java
c.
Cross-site scripting
d.
Cookies
Feedback
Your answer is correct.
Question 7
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Always disable unnecessary features of the web server that are not going to be
used
Select one:
True
False
Question 8
Complete
Mark 1.00 out of 1.00
Flag question
Question text
It is a special system used in industrial environments and settings to monitor
their operations
Select one:
a.
Mainframe
b.
Embedded
c.
Android
d.
SCADA
Feedback
Your answer is correct.
Question 9
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Large volume of data is also known as
Big data
Answer:
Question 10
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Developers should always implement validation at both the client and the server
to obtain high level of security.
Select one:
True
False
Question 11
Complete
Mark 1.00 out of 1.00
Flag question
Question text
It is an advanced method of handling an error.
Exception handling
Answer:
Question 12
Complete
Mark 1.00 out of 1.00
Flag question
Question text
It is a restricted area with a resource that these Java applications can access.
Select one:
a.
ActiveX controls
b.
Scripting
c.
Java
d.
Sandbox
Feedback
Your answer is correct.
Question 13
Complete
Mark 1.00 out of 1.00
Flag question
Question text
SMTP and FTP are used to transfer information over a computer network.
Select one:
True
False
Question 14
Complete
Mark 1.00 out of 1.00
Flag question
Question text
It is the idea of developing a database system to store and retrieve large
volumes of data
NoSQL database
Answer:
Question 15
Complete
Mark 1.00 out of 1.00
Flag question
Question text
To avoid and prevent this type of attack, users should always choose the
“Remember Me” option when logging in to any web site.
Select one:
True
False