Web Security, Security Management, Law, Ethics and Privacy (ch14, 15, 19) Flashcards

1
Q

A cookie can be used to authenticate a user to a web site so that the user does not have to type in his password for each connection to the site.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malicious JavaScripts is a major threat to browser security.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

XSS is possible when a web site does not check user input properly and use the input in an outgoing html page.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

XSS can perform many types of malicious actions because a malicious script is executed at user?s browser.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

XSRF is possible when a user has a connection to a malicious site while a connection to a legitimate site is still alive.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In XSRF, the malicious site can send malicious script to execute in the user?s browser by embedding the script in a hidden iframe.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It is easy for the legitimate site to know if a request is really from the (human) user.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SQL injection attacks only lead to information disclosure.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Using an input filter to block certain characters is an effective way to prevent SQL injection attacks.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SQL injection is yet another example that illustrates the importance of input validation.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Organizational security objectives identify what IT security outcomes should be achieved.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Since the responsibility for IT security is shared across the
organization, there is a risk of inconsistent implementation of security and a loss of central monitoring and control.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Legal and regulatory constraints may require specific approaches to risk assessment.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

One asset may have multiple threats and a single threat may target multiple assets.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It is likely that an organization will not have the resources to implement all the recommended controls.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The IT security management process ends with the implementation of controls and the training of personnel.

A

False

17
Q

The relative lack of success in bringing cybercriminals to justice has led to an increase in their numbers, boldness, and the global scale of their operations.

A

True

18
Q

The purpose of the privacy functions is to provide a user protection against discovery and misuse of identity by other users.

A

True

19
Q

An IT security plan should include details of ________.

A. risks

B. recommended controls

C. responsible personnel

D. all of the above

A

D

20
Q

______ is a function that removes specific identifying information from query results, such as last name and telephone number, but creates some sort of unique identifier so that analysts can detect connections between queries.

A. Anonymization

B. Data transformation

C. Immutable audit

D. Selective revelation

A

A

21
Q

Web browser can be attacked by any website that it visits.

A

True

22
Q

Even if a browser is compromised, the rest of the computer is still secure.

A

False

23
Q

Web servers can be compromised because of exploits on web applications.

A

True