Chapter 12 – Internet and World Wide Web Security

Which of the following is a highly secure public facility in which backbones have interconnected data lines and routers that exchange routing and traffic data?
NAP
What makes IP spoofing possible for computers on the Internet?
the lack of authentication
What type of attack exploits a lack of bounds checking on the size of data stored in an array?
buffer overflow
What type of attack involves plaintext scripting that affects database?
SQL injection
What type of attack displays false information masquerading as legitimate data?
Phishing
Which variation on phishing modifies the user’s host file to redirect traffic?
Pharming
What is a zone transfer?
updating a secondary DNS server
What type of DNS configuration prevents internal zone information from being stored on an Internet- accessible server?
split-DNS architecture
Which of the following is a top-level digital certificate in the PKI chain?
Trust anchor
Which aspect of hardening a Windows Web server allows you to resist access to the web server based on IP address?
access control