Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
10 Cards in this Set
- Front
- Back
What language below is for the transport and storage of data, with thefocus on what the data is? |
XML |
|
The exchange of information among DNS servers regarding configured zonesis known as: |
zonetransfer |
|
When TCP/IP was developed, the host table concept was expanded into ahierarchical name system for matching computer names and numbers using thisservice: |
DNS |
|
What language below is designed to display data, with a primary focus onhow the data looks? |
HTML |
|
An attack in which the attacker attempts toimpersonate the user by using his or her session token is known as: |
Sessionhijacking |
|
Attacks that take place against web based services are considered to bewhat type of attack? |
server-side |
|
Select below the string of characters that can be used to traverse upone directory level from the root directory: |
../ |
|
The default root directory of the Microsoft Internet InformationServices (IIS) Web server is located at which directory below? |
C:\Inetpub\wwwroot |
|
Choose the SQL injection statement example below that could be used tofind specific users: |
whatever'OR full_name LIKE '%Mia%' |
|
How can an attacker substitute a DNS addressso that a computer is automatically redirected to another device? |
DNSpoisoning |