Which component is included in IP security? September 13, 2021September 13, 2021 administrator Which component is included in IP security?All Options are CorrectWell Done. Your Answer is Correct Keep it Up!authentication header (ah)encapsulating security payload (esp) internet key exchange (ike)
IPSec is designed to provide security at the _________ September 13, 2021September 13, 2021 administrator IPSec is designed to provide security at the _________network layerWell Done. Your Answer is Correct Keep it Up!transport layerapplication layersession layer
Why would a hacker use a proxy server? September 13, 2021September 13, 2021 administrator Why would a hacker use a proxy server?to hide malicious activity on the networkWell Done. Your Answer is Correct Keep it Up!to obtain a remote access connectionto create a ghost server on the network.to create a stronger connection with the target.
Imagine a social networking web app (like Twitter) that allows users to post short blurbs of text. September 13, 2021September 13, 2021 administrator Imagine a social networking web app (like Twitter) that allows users to post short blurbs of text.cross-site scripting and sql injectionWell Done. Your Answer is Correct Keep it Up!sql injectionpacket sniffingNone of the Options are Correct
What are the two primary classifications of cross-site scripting? September 13, 2021September 13, 2021 administrator What are the two primary classifications of cross-site scripting?non-persistent and persistentWell Done. Your Answer is Correct Keep it Up!traditional and non-persistenttraditional and dom baseddom based and persistent
For a client-server authentication, the client requests from the KDC a ________ for access to a specific asset. September 13, 2021September 13, 2021 administrator For a client-server authentication, the client requests from the KDC a ________ for access to a specific asset.ticketWell Done. Your Answer is Correct Keep it Up!localtokenuser
What is one advantage of setting up a DMZ with two firewalls? September 13, 2021September 13, 2021 administrator What is one advantage of setting up a DMZ with two firewalls?you can do load balancingWell Done. Your Answer is Correct Keep it Up!improved network performanceyou can do stateful packet filteringyou can control where traffic goes in three networks
The basic Web Services platform is combination of _____ and _______ September 13, 2021September 13, 2021 administrator The basic Web Services platform is combination of _____ and _______xml + httpWell Done. Your Answer is Correct Keep it Up!xml + htmlcss + httpcss + java
The _______ mode is normally used when we need host-to-host (end-to-end) protection of data. September 13, 2021September 13, 2021 administrator The _______ mode is normally used when we need host-to-host (end-to-end) protection of data.transportWell Done. Your Answer is Correct Keep it Up!tunnelBoth Options are CorrectNone of the Options are Correct
For each _______ the Kerberos Key Distribution Center (KDC) maintains a database of the realm’s principal and the principal’s associated “secret keys”. September 13, 2021September 13, 2021 administrator For each _______ the Kerberos Key Distribution Center (KDC) maintains a database of the realm’s principal and the principal’s associated “secret keys”.realmWell Done. Your Answer is Correct Keep it Up!keydocumentNone of the Options are Correct