• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back

What language below is for the transport and storage of data, with thefocus on what the data is?

XML

The exchange of information among DNS servers regarding configured zonesis known as:

zonetransfer

When TCP/IP was developed, the host table concept was expanded into ahierarchical name system for matching computer names and numbers using thisservice:

DNS

What language below is designed to display data, with a primary focus onhow the data looks?

HTML

An attack in which the attacker attempts toimpersonate the user by using his or her session token is known as:

Sessionhijacking

Attacks that take place against web based services are considered to bewhat type of attack?

server-side

Select below the string of characters that can be used to traverse upone directory level from the root directory:

../

The default root directory of the Microsoft Internet InformationServices (IIS) Web server is located at which directory below?

C:\Inetpub\wwwroot

Choose the SQL injection statement example below that could be used tofind specific users:

whatever'OR full_name LIKE '%Mia%'

How can an attacker substitute a DNS addressso that a computer is automatically redirected to another device?

DNSpoisoning