Which of the following is a primary risk factor when authenticating with a standard HTTP server?
Irina has contracted with a company to provide Web design consulting services. The company has asked her to use several large files available via an HTTP server. The IT department has provided Irina with user name and password, as well as the DNS name of the HTTP server. She then used this information to obtain the files she needs to complete her task using Mozilla Firefox. Which of the following is a primary risk factor when authenticating with a standard HTTP server?
Which term best describes this device?
You have been assigned to configure a DMZ that uses multiple firewall components. Specifically, you must configure a router that will authoritatively monitor and, if necessary, block traffic. This device will be the last one that inspects traffic before it passes to the internal network. Which term best describes this device?
Which of the following techniques will best help reduce the severity of this attack?
A distributed denial-of-service (DDOS) attack has occurred where both ICMP and TCP packets have crashed the company’s Web server. Which of the following techniques will best help reduce the severity of this attack?
Which of the following is most likely to pose a security threat to a Web server?
Which of the following is most likely to pose a security threat to a Web server?
Which of the following methods is more quantitative than direct user feedback…
User feedback can be evaluated in many ways. Which of the following methods is more quantitative than direct user feedback, and will provide indirect feedback from the majority of users who do not respond?
Why does the home page not validate properly?
Tom is making changes to his company’s Web site. Because he likes the way the markup is styled, he copies the following into another section of the page:
<div id="subsection"> This section is under construction</div>
Why does the home page not validate properly?
Which of the following attributes must he include in the tag to allow the first cell to span across…
Jason needs to create a table with four columns and six rows. Which of the following attributes must he include in the <td> tag to allow the first cell to span across the entire width of the table?
Which of the following formats uses Extensible Markup Language (XML) to describe certain shapes …
Which of the following formats uses Extensible Markup Language (XML) to describe certain shapes and is best for working with two-dimensional line art and shapes?
Which of the following will typically occur during this process?
An application is creating hashes of each file on an attached storage device. Which of the following will typically occur during this process?
How can he establish consistency for the structure and layout of all the pages…
George is developing an intranet site for his company. How can he establish consistency for the structure and layout of all the pages, but leave decisions about the content of each page to the individual departments?